Vulnerabilities > Schneider Electric > Modicon M221 Firmware > Low

DATE CVE VULNERABILITY TITLE RISK
2020-12-11 CVE-2020-28214 Use of a One-Way Hash with a Predictable Salt vulnerability in Schneider-Electric Modicon M221 Firmware
A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide.
local
low complexity
schneider-electric CWE-760
2.1
2020-11-19 CVE-2020-7567 Missing Encryption of Sensitive Data vulnerability in Schneider-Electric Modicon M221 Firmware
A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Modicon M221 (all references, all versions) that could allow the attacker to find the password hash when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller and broke the encryption keys.
2.9
2020-11-19 CVE-2020-7568 Information Exposure vulnerability in Schneider-Electric Modicon M221 Firmware
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Modicon M221 (all references, all versions) that could allow non sensitive information disclosure when the attacker has captured the traffic between EcoStruxure Machine - Basic software and Modicon M221 controller.
low complexity
schneider-electric CWE-200
3.3
2019-05-22 CVE-2018-7822 Incorrect Default Permissions vulnerability in Schneider-Electric Modicon M221 Firmware and Somachine Basic
An Incorrect Default Permissions (CWE-276) vulnerability exists in SoMachine Basic, all versions, and Modicon M221(all references, all versions prior to firmware V1.10.0.0) which could cause unauthorized access to SoMachine Basic resource files when logged on the system hosting SoMachine Basic.
local
low complexity
schneider-electric CWE-276
2.1