7.5
HIGH
CVE-2020-7477
"Quantum Ethernet Modbus Command Processing Denial of Service"
Description

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Quantum Ethernet Network module 140NOE771x1 (Versions 7.0 and prior), Quantum processors with integrated Ethernet – 140CPU65xxxxx (all Versions), and Premium processors with integrated Ethernet (all Versions), which could cause a Denial of Service when sending a specially crafted command over Modbus.

INFO

Published Date :

March 23, 2020, 8:15 p.m.

Last Modified :

Nov. 21, 2024, 5:37 a.m.

Remotely Exploitable :

Yes !

Impact Score :

3.6

Exploitability Score :

3.9
Affected Products

The following products are affected by CVE-2020-7477 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Schneider-electric 140noe77101_firmware
2 Schneider-electric 140noe77111_firmware
3 Schneider-electric 140cpu65150_firmware
4 Schneider-electric 140cpu65160_firmware
5 Schneider-electric tsxp574634m_firmware
6 Schneider-electric tsxp575634m_firmware
7 Schneider-electric tsxp576634m_firmware
8 Schneider-electric tsxp571634m_firmware
9 Schneider-electric tsxp572634m_firmware
10 Schneider-electric tsxp573634m_firmware
11 Schneider-electric 140cpu65260_firmware
12 Schneider-electric 140cpu65860_firmware
13 Schneider-electric 140cpu65160s_firmware
14 Schneider-electric tsxh5724m_firmware
15 Schneider-electric tsxh5744m_firmware
16 Schneider-electric tsxp57104m_firmware
17 Schneider-electric tsxp57154m_firmware
18 Schneider-electric tsxp57204m_firmware
19 Schneider-electric tsxp57254m_firmware
20 Schneider-electric tsxp57304m_firmware
21 Schneider-electric tsxp57454m_firmware
22 Schneider-electric tsxp57554m_firmware
23 Schneider-electric 140cpu67261_firmware
24 Schneider-electric 140cpu67060_firmware
25 Schneider-electric 140cpu67160_firmware
26 Schneider-electric 140cpu67260_firmware
27 Schneider-electric 140cpu67861_firmware
28 Schneider-electric 140cpu67160s_firmware
29 Schneider-electric 140cpu65150
30 Schneider-electric 140cpu65160
31 Schneider-electric 140cpu65260
32 Schneider-electric 140cpu65860
33 Schneider-electric 140cpu65160s
34 Schneider-electric tsxh5724m
35 Schneider-electric tsxh5744m
36 Schneider-electric tsxp57104m
37 Schneider-electric tsxp57154m
38 Schneider-electric tsxp571634m
39 Schneider-electric tsxp57254m
40 Schneider-electric tsxp572634m
41 Schneider-electric tsxp57304m
42 Schneider-electric tsxp573634m
43 Schneider-electric tsxp57454m
44 Schneider-electric tsxp574634m
45 Schneider-electric tsxp575634m
46 Schneider-electric tsxp57554m
47 Schneider-electric 140noe77111
48 Schneider-electric 140noe77101
49 Schneider-electric tsxp57204m_
50 Schneider-electric 140cpu67261
51 Schneider-electric 140cpu67060
52 Schneider-electric 140cpu67160
53 Schneider-electric 140cpu67260
54 Schneider-electric 140cpu67861
55 Schneider-electric 140cpu67160s
56 Schneider-electric tsxp576634m_
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2020-7477.

URL Resource
https://www.se.com/ww/en/download/document/SEVD-2020-070-02/ Vendor Advisory
https://www.se.com/ww/en/download/document/SEVD-2020-070-02/ Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-7477 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-7477 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://www.se.com/ww/en/download/document/SEVD-2020-070-02/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Mar. 25, 2020

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Changed Reference Type https://www.se.com/ww/en/download/document/SEVD-2020-070-02/ No Types Assigned https://www.se.com/ww/en/download/document/SEVD-2020-070-02/ Vendor Advisory
    Added CWE NIST CWE-754
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140noe77101_firmware:*:*:*:*:*:*:*:* versions up to (including) 7.0 OR cpe:2.3:h:schneider-electric:140noe77101:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140noe77111_firmware:*:*:*:*:*:*:*:* versions up to (including) 7.0 OR cpe:2.3:h:schneider-electric:140noe77111:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxh5744m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxh5744m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxh5724m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxh5724m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp576634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp576634m_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57554m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57554m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp575634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57454m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57454m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp574634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp573634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57304m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57304m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57254m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57254m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp572634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57204m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57204m_:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp571634m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57154m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57154m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:tsxp57104m_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:tsxp57104m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu65150_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu65150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu65160_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu65160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu65260_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu65260:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67060_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67060:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67160_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67260_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67260:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu65860_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu65860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67861_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu65160s_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu65160s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:schneider-electric:140cpu67160s_firmware:*:*:*:*:*:*:*:* OR cpe:2.3:h:schneider-electric:140cpu67160s:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-7477 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2020-7477 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.10 }} 0.00%

score

0.40663

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability