CVE-2020-7535

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in Schneider Electric Modicon PLC web servers allows attackers to access restricted files by sending specially crafted HTTP requests. It affects Modicon M340, Quantum, and Premium PLCs and associated communication modules. Successful exploitation could lead to unauthorized information disclosure.

💻 Affected Systems

Products:
  • Modicon M340
  • Modicon Quantum
  • Modicon Premium
  • Associated Communication Modules
Versions: See vendor advisory for specific affected versions
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web server component of PLCs; requires HTTP access to the controller

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through access to sensitive configuration files, credentials, or firmware, potentially enabling further attacks on industrial control systems.

🟠

Likely Case

Disclosure of sensitive information including configuration data, network settings, and potentially credentials stored on the PLC.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external attackers from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity; no authentication required to exploit

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to vendor advisory SEVD-2020-343-05 for specific patched versions

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-343-05/

Restart Required: Yes

Instructions:

1. Download firmware updates from Schneider Electric website. 2. Follow vendor instructions for PLC firmware update procedure. 3. Apply updates to all affected PLCs and communication modules. 4. Restart affected devices.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs from untrusted networks and restrict HTTP access

Access Control Lists

all

Implement firewall rules to restrict HTTP access to PLC web interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from untrusted networks
  • Disable web server functionality if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version against vendor advisory; test with controlled path traversal attempts if authorized

Check Version:

Check PLC firmware version via web interface or programming software

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory; retest vulnerability if authorized

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests with directory traversal patterns
  • Multiple failed attempts to access restricted paths

Network Indicators:

  • HTTP requests containing '../' sequences or similar path traversal patterns to PLC IPs

SIEM Query:

source_ip="PLC_IP" AND http_uri CONTAINS "../" OR http_uri CONTAINS "..\\"

🔗 References

📤 Share & Export