Ê©Ä͵ÂModicon M221ȫϵPLCÎó²îÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2018-11-20Îó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºCVE-2018-7789£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬CVSS·ÖÖµ£º7.5
Ó°Ïì°æ±¾
Modicon M221 PLC£¬£¬£¬£¬£¬È«ÏµËùÓа汾
Îó²î¸ÅÊö
Modicon M221 ϵÁÐPLC»ùÓÚSoMachine BasicÈí¼þƽ̨£¬£¬£¬£¬£¬×¨Îª¼òÆÓ»úеװ±¸Éè¼Æ£¬£¬£¬£¬£¬ÐÎ×´¾«ÇÉ£¬£¬£¬£¬£¬²Ù×÷¼òÆÓ£¬£¬£¬£¬£¬±¾ÌåÄÚÖøßËÙ¼ÆÊý£¬£¬£¬£¬£¬½ÓÄÉÂö³åÊä³ö¡¢Ä£ÄâÁ¿ÊäÈë·½·¨£¬£¬£¬£¬£¬Ö§³ÖÒÔÌ«Íø¼°ModbusͨѶ¡£¡£¡£¡£¡£¡£¡£
Êý¾ÝÕæÊµÐÔÑé֤ȱ·¦CWE-345£¨CVE-2018-7798£©ÔÚUMASÐÒéÖв»×¼È·µØÖ´ÐÐÍøÂçÉèÖÃÄ£¿£¿£¿£¿£¿£¿£¿é£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔ¶³ÌÐÞ¸ÄÉèÖòÎÊýÀ´×赲ĿµÄPLCµÄÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÀÖ³ÉʹÓÃÎó²î£¬£¬£¬£¬£¬¿ÉÔ¶³Ì¸ü¸ÄPLCµÄIPv4ÉèÖã¨IPµØµã£¬£¬£¬£¬£¬ÑÚÂëºÍÍø¹Ø£©£¬£¬£¬£¬£¬´Ó¶ø×è°PLCµÄÍøÂçÁ÷Á¿µ¼ÖÂͨѶÒì³£¡£¡£¡£¡£¡£¡£¡£
¸ÃÎó²îÔÚ2018Äê8ÔÂ28ÈÕÐû²¼£¬£¬£¬£¬£¬CVSS·ÖֵΪ4.8£¬£¬£¬£¬£¬2018Äê11ÔÂ16ÈÕ£¬£¬£¬£¬£¬Eduard Kovacs½ÒÏþÎÄÕ£¬£¬£¬£¬£¬CVSSÎó²îÆÀ·ÖÔÚ¹¤Òµ¿ØÖÆÏµÍ³ÖдøÀ´Îóµ¼£¬£¬£¬£¬£¬Ìá¼°ÁËCVE-2018-7789Îó²î£¬£¬£¬£¬£¬CVSS¹Ù·½½«·ÖÖµ¸üÐÂΪ7.5·Ö¡£¡£¡£¡£¡£¡£¡£
Îó²îÑéÖ¤
ÔÝÎÞPOC/EXP
ÐÞ¸´½¨Òé
ÉèÖ÷À»ðǽ£¬£¬£¬£¬£¬×èÖ¹502¶Ë¿ÚµÄËùÓÐÔ¶³Ì/Íⲿ»á¼û
ÔÚModicon M221Ó¦ÓóÌÐòÖнûÓÃËùÓÐδʹÓõÄÐÒ飬£¬£¬£¬£¬ÌØÊâÊDZà³ÌÐÒ飬£¬£¬£¬£¬Õ⽫×èÖ¹M221 PLCµÄÔ¶³Ì±à³Ì¡£¡£¡£¡£¡£¡£¡£
È·±£¿£¿£¿£¿£¿£¿£¿ØÖÆÆ÷´¦ÓÚËø¶¨µÄ»ú¹ñÖУ¬£¬£¬£¬£¬ÈçÎÞÐëÒª²»ÒªÆôÓá°Program¡±Ä£Ê½
×èÖ¹½«¿ØÖÆ×°±¸»ò²Ù×÷վ̻¶ÔÚ»¥ÁªÍøÖУ¬£¬£¬£¬£¬È·±£¹¤Òµ¿ØÖÆÏµÍ³ÓëÐÅÏ¢ÍøÂçÍêÈ«¸ôÀë
ÍâÁª¹Ü¿Ø£¬£¬£¬£¬£¬×èÖ¹²»Çå¾²µÄÒÆ¶¯×°±¸½ÓÈë¸ôÀëÍøÂç
µ±±ØÐè¾ÙÐÐÔ¶³Ì»á¼ûʱ£¬£¬£¬£¬£¬ÇëʹÓÃÇå¾²ÒªÁ죬£¬£¬£¬£¬ÀýÈçʹÓÃÐéÄâרÓÃÍøÂ磨VPN£©£¬£¬£¬£¬£¬²¢Í¬Ê±È·±£VPN×ÔÉíµÄÇå¾²ÐÔ
Ê©ÄÍµÂµçÆø±¨¸æ³Æ£¬£¬£¬£¬£¬´ËÎó²îµÄÐÞ¸´³ÌÐòÊÇÔÚModicon M221¹Ì¼þv1.6.2.0ÖÐʵÏֵ쬣¬£¬£¬£¬ÔÚSoMachine Basic v1.6 SP2ÖÐÌṩ£¬£¬£¬£¬£¬»òÕßʹÓÃSchneider ElectricÈí¼þ¸üй¤¾ß¡£¡£¡£¡£¡£¡£¡£
https://www.schneider-electric.com/en/download/document/SoMachineBasicV1.6SP2/
²Î¿¼Á´½Ó
https://www.securityweek.com/flaw-schneider-plc-allows-significant-disruption-ics
https://nvd.nist.gov/vuln/detail/CVE-2018-7789
https://www.securityweek.com/cvss-scores-often-misleading-ics-vulnerabilities-experts