CVE-2020-7534
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
04/02/2022
Last modified:
10/04/2024
Description
A CWE-352: Cross-Site Request Forgery (CSRF) vulnerability exists on the web server used, that could cause a leak of sensitive data or unauthorized actions on the web server during the time the user is logged in. Affected Products: Modicon M340 CPUs: BMXP34 (All Versions), Modicon Quantum CPUs with integrated Ethernet (Copro): 140CPU65 (All Versions), Modicon Premium CPUs with integrated Ethernet (Copro): TSXP57 (All Versions), Modicon M340 ethernet modules: (BMXNOC0401, BMXNOE01, BMXNOR0200H) (All Versions), Modicon Quantum and Premium factory cast communication modules: (140NOE77111, 140NOC78*00, TSXETY5103, TSXETY4103) (All Versions)
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:schneider-electric:modicon_m340_bmxp342020_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:140cpu65_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:140cpu65:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:tsxp57_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:tsxp57:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:bmxnoc0401_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:bmxnoc0401:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:bmxnoe01_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:bmxnoe01:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:bmxnor0200h_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:bmxnor0200h:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:140noe77111_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:schneider-electric:140noe77111:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:schneider-electric:140noc78000_firmware:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



