Ê©Ä͵ÂModicon M221ȫϵPLCÎó²îÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2018-11-20Îó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºCVE-2018-7789£¬£¬£¬£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬£¬£¬£¬CVSS·ÖÖµ£º7.5
Ó°Ïì°æ±¾
Modicon M221 PLC£¬£¬£¬£¬£¬£¬È«ÏµËùÓа汾
Îó²î¸ÅÊö
Modicon M221 ϵÁÐPLC»ùÓÚSoMachine BasicÈí¼þƽ̨£¬£¬£¬£¬£¬£¬×¨Îª¼òÆÓ»úеװ±¸Éè¼Æ£¬£¬£¬£¬£¬£¬ÐÎ×´¾«ÇÉ£¬£¬£¬£¬£¬£¬²Ù×÷¼òÆÓ£¬£¬£¬£¬£¬£¬±¾ÌåÄÚÖøßËÙ¼ÆÊý£¬£¬£¬£¬£¬£¬½ÓÄÉÂö³åÊä³ö¡¢Ä£ÄâÁ¿ÊäÈë·½·¨£¬£¬£¬£¬£¬£¬Ö§³ÖÒÔÌ«Íø¼°ModbusͨѶ¡£¡£¡£¡£¡£
Êý¾ÝÕæÊµÐÔÑé֤ȱ·¦CWE-345£¨CVE-2018-7798£©ÔÚUMASÐÒéÖв»×¼È·µØÖ´ÐÐÍøÂçÉèÖÃÄ£¿£¿£¿£¿é£¬£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÔ¶³ÌÐÞ¸ÄÉèÖòÎÊýÀ´×赲ĿµÄPLCµÄÍøÂçÁ÷Á¿¡£¡£¡£¡£¡£¹¥»÷ÕßÀÖ³ÉʹÓÃÎó²î£¬£¬£¬£¬£¬£¬¿ÉÔ¶³Ì¸ü¸ÄPLCµÄIPv4ÉèÖã¨IPµØµã£¬£¬£¬£¬£¬£¬ÑÚÂëºÍÍø¹Ø£©£¬£¬£¬£¬£¬£¬´Ó¶ø×è°PLCµÄÍøÂçÁ÷Á¿µ¼ÖÂͨѶÒì³£¡£¡£¡£¡£¡£
¸ÃÎó²îÔÚ2018Äê8ÔÂ28ÈÕÐû²¼£¬£¬£¬£¬£¬£¬CVSS·ÖֵΪ4.8£¬£¬£¬£¬£¬£¬2018Äê11ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Eduard Kovacs½ÒÏþÎÄÕ£¬£¬£¬£¬£¬£¬CVSSÎó²îÆÀ·ÖÔÚ¹¤Òµ¿ØÖÆÏµÍ³ÖдøÀ´Îóµ¼£¬£¬£¬£¬£¬£¬Ìá¼°ÁËCVE-2018-7789Îó²î£¬£¬£¬£¬£¬£¬CVSS¹Ù·½½«·ÖÖµ¸üÐÂΪ7.5·Ö¡£¡£¡£¡£¡£
Îó²îÑéÖ¤
ÔÝÎÞPOC/EXP
ÐÞ¸´½¨Òé
ÉèÖ÷À»ðǽ£¬£¬£¬£¬£¬£¬×èÖ¹502¶Ë¿ÚµÄËùÓÐÔ¶³Ì/Íⲿ»á¼û
ÔÚModicon M221Ó¦ÓóÌÐòÖнûÓÃËùÓÐδʹÓõÄÐÒ飬£¬£¬£¬£¬£¬ÌØÊâÊDZà³ÌÐÒ飬£¬£¬£¬£¬£¬Õ⽫×èÖ¹M221 PLCµÄÔ¶³Ì±à³Ì¡£¡£¡£¡£¡£
È·±£¿£¿£¿£¿ØÖÆÆ÷´¦ÓÚËø¶¨µÄ»ú¹ñÖУ¬£¬£¬£¬£¬£¬ÈçÎÞÐëÒª²»ÒªÆôÓá°Program¡±Ä£Ê½
×èÖ¹½«¿ØÖÆ×°±¸»ò²Ù×÷վ̻¶ÔÚ»¥ÁªÍøÖУ¬£¬£¬£¬£¬£¬È·±£¹¤Òµ¿ØÖÆÏµÍ³ÓëÐÅÏ¢ÍøÂçÍêÈ«¸ôÀë
ÍâÁª¹Ü¿Ø£¬£¬£¬£¬£¬£¬×èÖ¹²»Çå¾²µÄÒÆ¶¯×°±¸½ÓÈë¸ôÀëÍøÂç
µ±±ØÐè¾ÙÐÐÔ¶³Ì»á¼ûʱ£¬£¬£¬£¬£¬£¬ÇëʹÓÃÇå¾²ÒªÁ죬£¬£¬£¬£¬£¬ÀýÈçʹÓÃÐéÄâרÓÃÍøÂ磨VPN£©£¬£¬£¬£¬£¬£¬²¢Í¬Ê±È·±£VPN×ÔÉíµÄÇå¾²ÐÔ
Ê©ÄÍµÂµçÆø±¨¸æ³Æ£¬£¬£¬£¬£¬£¬´ËÎó²îµÄÐÞ¸´³ÌÐòÊÇÔÚModicon M221¹Ì¼þv1.6.2.0ÖÐʵÏֵ쬣¬£¬£¬£¬£¬ÔÚSoMachine Basic v1.6 SP2ÖÐÌṩ£¬£¬£¬£¬£¬£¬»òÕßʹÓÃSchneider ElectricÈí¼þ¸üй¤¾ß¡£¡£¡£¡£¡£
https://www.schneider-electric.com/en/download/document/SoMachineBasicV1.6SP2/
²Î¿¼Á´½Ó
https://www.securityweek.com/flaw-schneider-plc-allows-significant-disruption-ics
https://nvd.nist.gov/vuln/detail/CVE-2018-7789
https://www.securityweek.com/cvss-scores-often-misleading-ics-vulnerabilities-experts


¾©¹«Íø°²±¸11010802024551ºÅ