cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-45788,https://securityvulnerability.io/vulnerability/CVE-2022-45788,Improper Condition Check in EcoStruxure Control Expert and Modicon Products,"A vulnerability exists within Schneider Electric's EcoStruxure Control Expert and various Modicon products due to improper checks for unusual or exceptional conditions. When a malicious project file is loaded onto the controller, it can lead to extensive security risks, including arbitrary code execution, potential denial of service, and a compromise of confidentiality and integrity. The scope of this vulnerability spans multiple versions of several products, indicating a widespread potential impact across Schneider Electric's portfolio.",Schneider Electric,"Ecostruxure Control Expert,Ecostruxure Process Expert,Modicon M340 Cpu (part Numbers Bmxp34*),Modicon M580 Cpu (part Numbers Bmep* And Bmeh*),Modicon M580 Cpu Safety (part Numbers Bmep58*s And Bmeh58*s),Modicon Momentum Unity M1e Processor (171cbu*),Modicon Mc80 (bmkc80),Legacy Modicon Quantum (140cpu65*) And Premium Cpus (tsxp57*)",7.5,HIGH,0.0018400000408291817,false,,false,false,false,,,false,false,,2023-01-30T00:00:00.000Z,0 CVE-2020-7543,https://securityvulnerability.io/vulnerability/CVE-2020-7543,Denial of Service Vulnerability in Modicon Controllers by Schneider Electric,"A vulnerability exists within Modicon controllers produced by Schneider Electric that can lead to a denial of service condition. This occurs when a specially crafted Read Physical Memory request is sent over the Modbus protocol to the affected controllers. Such exploitation may disrupt the regular operations of the devices, posing a risk to the stability and security of the control system. It is critical for users of Modicon M580, M340, Quantum, and Premium controllers to update their systems and apply necessary mitigations as per the latest security advisories.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:52:21.000Z,0 CVE-2020-7542,https://securityvulnerability.io/vulnerability/CVE-2020-7542,Improper Condition Check Vulnerability in Modicon Controllers by Schneider Electric,"A vulnerability exists in Schneider Electric's Modicon controllers, including models M580, M340, Quantum, and Premium, due to inadequate checks for exceptional conditions. When an attacker sends a specially crafted Read Physical Memory request over the Modbus protocol, it may lead to a denial of service, disrupting operations and potentially impacting the availability of the affected controllers.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:52:14.000Z,0 CVE-2020-7537,https://securityvulnerability.io/vulnerability/CVE-2020-7537,Improper Check for Unusual Conditions in Modicon Controllers by Schneider Electric,"A vulnerability exists in certain Modicon Controllers from Schneider Electric, particularly affecting the Modicon M580, M340, Quantum, and Premium series. This issue is classified as improper checking for unusual or exceptional conditions. It allows an attacker to potentially cause a denial of service by sending a specially crafted Read Physical Memory request via Modbus to the controller. This vulnerability raises concerns about the stability and reliability of industrial control systems, necessitating prompt attention to security alerts and patches provided by Schneider Electric.",Schneider Electric,"Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see Security Notifications For Affected Versions)",7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-12-11T00:51:52.000Z,0