Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-22787

EPSS 0.43% · P63
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-22787

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A CWE-20: Improper Input Validation vulnerability exists that could cause denial of service of the device when an attacker sends a specially crafted HTTP request to the web server of the device. Affected Product: Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X80 Ethernet Communication Modules: BMXNOE0100 (H), BMXNOE0110 (H), BMXNOC0401, BMXNOR0200H RTU (All Versions), Modicon Premium Processors with integrated Ethernet (Copro): TSXP574634, TSXP575634, TSXP576634 (All Versions), Modicon Quantum Processors with Integrated Ethernet (Copro): 140CPU65xxxxx (All Versions), Modicon Quantum Communication Modules: 140NOE771x1, 140NOC78x00, 140NOC77101 (All Versions), Modicon Premium Communication Modules: TSXETY4103, TSXETY5103 (All Versions)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Schneider Electric Modicon M340 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Schneider Electric Modicon M340是法国施耐德电气(Schneider Electric)公司的一款用于工业过程和基础设施的中程PLC(可编程逻辑控制器)。 Schneider Electric Modicon M340存在输入验证错误漏洞,当攻击者向设备的 Web 服务器发送特制的 HTTP 请求时,该漏洞可能导致设备拒绝服务。受影响的产品:Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X8
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X80 Ethernet Communication Modules: BMXNOE0100 (H), BMXNOE0110 (H), BMXNOC0401, BMXNOR0200H RTU (All Versions), Modicon Premium Processors with integrated Ethernet (Copro): TSXP574634, TSXP Modicon M340 CPUs: BMXP34 (Versions prior to V3.40), Modicon M340 X80 Ethernet Communication Modules: BMXNOE0100 (H), BMXNOE0110 (H), BMXNOC0401, BMXNOR0200H RTU (All Versions), Modicon Premium Processors with integrated Ethernet (Copro): TSXP574634, TSXP -

II. Public POCs for CVE-2021-22787

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-22787

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-02-11 · 68 CVEs total

CVE-2021-235559.8 CRITICALSandbox Bypass
CVE-2021-235977.5 HIGHDenial of Service (DoS)
CVE-2021-22785Schneider Electric 多款产品信息泄露漏洞
CVE-2021-45387AppNeta tcpreplay 安全漏洞
CVE-2021-45386Appneta Tcpreplay 安全漏洞
CVE-2021-45385ffjpeg 代码问题漏洞
CVE-2021-42940Projeqtor 安全漏洞
CVE-2021-44111S-cart 路径遍历漏洞
CVE-2021-31932Nokia BTS TRS web console 安全漏洞
CVE-2021-22748Schneider Electric C-Bus Toolkit 路径遍历漏洞
CVE-2021-22796Schneider Electric 多款产品授权问题漏洞
CVE-2020-36062PHPGurukul Dairy Farm Shop Management System 信任管理问题漏洞
CVE-2021-22798Schneider Electric Conext™ComBox 安全漏洞
CVE-2021-22788Schneider Electric 多款产品缓冲区错误漏洞
CVE-2021-22806Schneider Electric 多款产品安全漏洞
CVE-2021-22801Schneider Electric ConneXium Network Manager Software 安全漏洞
CVE-2021-22803Schneider Electric IGSS 代码问题漏洞
CVE-2021-22802Schneider Electric IGSS 安全漏洞
CVE-2021-22804Schneider Electric IGSS 路径遍历漏洞
CVE-2021-22805Schneider Electric IGSS 访问控制错误漏洞

Showing top 20 of 68 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-22787

No comments yet


Leave a comment