cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-22792,https://securityvulnerability.io/vulnerability/CVE-2021-22792,NULL Pointer Dereference Vulnerability in Schneider Electric Modicon Series,"A vulnerability exists in various Schneider Electric Modicon PLC controllers and simulators that allows a specially crafted project file to cause a NULL Pointer Dereference. This can lead to a Denial of Service, affecting the operational capabilities of the affected devices. Users are advised to apply the latest security updates to mitigate potential risks. This vulnerability impacts a range of products, including the Modicon M580, M340, MC80, and others.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",7.5,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2021-09-02T16:53:00.000Z,0 CVE-2021-22791,https://securityvulnerability.io/vulnerability/CVE-2021-22791,Out-of-bounds Write Vulnerability in Modicon PLC Controllers by Schneider Electric,"An out-of-bounds write vulnerability exists in various Modicon PLC controllers and simulators from Schneider Electric, which could be exploited when a specially crafted project file is used to update controller applications. This flaw may enable an attacker to cause a Denial of Service, potentially disrupting PLC operations and affecting system stability. It is critical for users of the affected products to ensure they are applying relevant updates and implementing security best practices to safeguard their systems.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2021-09-02T16:52:51.000Z,0 CVE-2021-22790,https://securityvulnerability.io/vulnerability/CVE-2021-22790,Denial of Service Vulnerability in Schneider Electric Modicon Controllers,"A vulnerability exists within Schneider Electric's Modicon PLC controllers and simulators that allows for an out-of-bounds read, potentially triggering a Denial of Service condition. This issue can arise when a specially crafted project file is used to update the controller application, impacting various models including Modicon M580, M340, MC80, Momentum Ethernet CPU, as well as simulators associated with their EcoStruxure Control Expert and Process Expert platforms.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2021-09-02T16:52:39.000Z,0 CVE-2021-22789,https://securityvulnerability.io/vulnerability/CVE-2021-22789,Buffer Overflow Vulnerability in Modicon PLC Controllers by Schneider Electric,"A vulnerability associated with improper memory boundary restrictions exists in various Modicon PLC controllers and simulators developed by Schneider Electric. This flaw can be exploited when a specially crafted project file is used to update the controller application, potentially leading to a Denial of Service condition. The affected products include multiple models of the Modicon PLC series as well as their associated simulators, affecting numerous deployment environments.",Schneider Electric,"Modicon M580 Cpu (part Numbers Bmep* And Bmeh*, All Versions), Modicon M340 Cpu (part Numbers Bmxp34*, All Versions), Modicon Mc80 (part Numbers Bmkc80*, All Versions), Modicon Momentum Ethernet Cpu (part Numbers 171cbu*, All Versions), Plc Simulator For Ecostruxureª Control Expert, Including All Unity Pro Versions (former Name Of Ecostruxureª Control Expert, All Versions), Plc Simulator For Ecostruxureª Process Expert Including All Hdcs Versions (former Name Of Ecostruxureª Process Expert, All Versions), Modicon Quantum Cpu (part Numbers 140cpu*, All Versions), Modicon Premium Cpu (part Numbers Tsxp5*, All Versions)",6.5,MEDIUM,0.0008099999977275729,false,,false,false,false,,,false,false,,2021-09-02T16:52:25.000Z,0 CVE-2020-7559,https://securityvulnerability.io/vulnerability/CVE-2020-7559,Buffer Overflow Vulnerability in EcoStruxure Control Expert by Schneider Electric,"A buffer overflow vulnerability exists in the PLC Simulator component of EcoStruxure Control Expert, formerly known as Unity Pro. This flaw can be exploited by sending specially crafted requests over the Modbus protocol, potentially leading to a crash of the PLC simulator. It highlights the importance of careful input size validation to prevent unexpected behavior and system instability.",Schneider Electric,Plc Simulator On Ecostruxureª Control Expert (now Unity Pro) (all Versions),7.5,HIGH,0.0008900000248104334,false,,false,false,false,,,false,false,,2020-11-19T21:04:25.000Z,0 CVE-2020-7538,https://securityvulnerability.io/vulnerability/CVE-2020-7538,Improper Check for Unusual Conditions in EcoStruxure Control Expert by Schneider Electric,"An improper check for unusual or exceptional conditions vulnerability exists in the PLC Simulator of EcoStruxure Control Expert (formerly Unity Pro). This flaw can lead to unexpected crashes when the simulator receives specially crafted requests via the Modbus protocol, potentially disrupting the operation of connected systems.",Schneider Electric,Plc Simulator On Ecostruxureª Control Expert (now Unity Pro) (all Versions),7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-11-19T21:04:18.000Z,0 CVE-2020-28213,https://securityvulnerability.io/vulnerability/CVE-2020-28213,Code Execution Vulnerability in PLC Simulator on EcoStruxure Control Expert by Schneider Electric,"A vulnerability in the PLC Simulator of EcoStruxure Control Expert allows for unauthorized command execution when specially crafted requests are sent over the Modbus protocol. This flaw arises from a lack of integrity checks during code downloads, potentially enabling attackers to manipulate the operational logic of the device.",Schneider Electric,Plc Simulator On Ecostruxureª Control Expert (now Unity Pro) (all Versions),8.8,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-11-19T21:03:54.000Z,0 CVE-2020-28212,https://securityvulnerability.io/vulnerability/CVE-2020-28212,Improper Authentication Management in EcoStruxure Control Expert by Schneider Electric,"A vulnerability exists in EcoStruxure Control Expert (formerly Unity Pro), which allows unauthorized command execution due to improper handling of excessive authentication attempts. This security flaw can be exploited through brute force attacks over the Modbus protocol, potentially compromising system integrity and operations.",Schneider Electric,Plc Simulator On Ecostruxureª Control Expert (now Unity Pro) (all Versions),9.8,CRITICAL,0.0042500002309679985,false,,false,false,false,,,false,false,,2020-11-19T21:03:43.000Z,0 CVE-2020-28211,https://securityvulnerability.io/vulnerability/CVE-2020-28211,Incorrect Authorization Vulnerability in EcoStruxure Control Expert by Schneider Electric,"An incorrect authorization vulnerability in the PLC Simulator of EcoStruxure Control Expert allows attackers to bypass authentication mechanisms. This vulnerability could be exploited by manipulating memory through the use of a debugger, resulting in unauthorized access to the system. All versions of the product are affected, highlighting the need for immediate attention and remediation to enhance security.",Schneider Electric,Plc Simulator On Ecostruxureª Control Expert (now Unity Pro) (all Versions),7.8,HIGH,0.00046999999904073775,false,,false,false,false,,,false,false,,2020-11-19T21:03:37.000Z,0