CVE-2017-7574 in Se and Schneider Electric Products
Published on April 6, 2017
Schneider Electric SoMachine Basic 1.4 SP1 and Schneider Electric Modicon TM221CE16R 1.3.3.3 devices have a hardcoded-key vulnerability. The Project Protection feature is used to prevent unauthorized users from opening an XML protected project file, by prompting the user for a password. This XML file is AES-CBC encrypted; however, the key used for encryption (SoMachineBasicSoMachineBasicSoMa) cannot be changed. After decrypting the XML file with this key, the user password can be found in the decrypted data. After reading the user password, the project can be opened and modified with the Schneider product.
Products Associated with CVE-2017-7574
stack.watch emails you whenever new vulnerabilities are published in Se Somachine or Schneider Electric Somachine. Just hit a watch button to start following.
Exploit Probability
EPSS
0.27%
Percentile
50.27%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.