CVE-2023-6408: Message Integrity Failure in Controller Comm Channel (DoS & MI)
CVE-2023-6408 Published on February 14, 2024

CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability exists that could cause a denial of service and loss of confidentiality, integrity of controllers when conducting a Man in the Middle attack.

NVD

Vulnerability Analysis

CVE-2023-6408 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Improper Enforcement of Message Integrity During Transmission in a Communication Channel

The software establishes a communication channel with an endpoint and receives a message from that endpoint, but it does not sufficiently ensure that the message was not modified during transmission. Attackers might be able to modify the message and spoof the endpoint by interfering with the data as it crosses the network or by redirecting the connection to a system under their control.


Products Associated with CVE-2023-6408

stack.watch emails you whenever new vulnerabilities are published in Schneider Electric Ecostruxure Control Expert or Schneider Electric Ecostruxure Process Expert. Just hit a watch button to start following.

 
 

Affected Versions

Schneider Electric Modicon M340 CPU (part numbers BMXP34*): Schneider Electric Modicon M580 CPU (part numbers BMEP* and BMEH*, excluding M580 CPU Safety): Schneider Electric Modicon M580 CPU Safety (part numbers BMEP58*S and BMEH58*S): Schneider Electric EcoStruxure Control Expert: Schneider Electric EcoStruxure Process Expert: schneider-electric modicon_m580_bmep585040_firmware: schneider-electric modicon_m340_bmxp342030h_firmware: schneider-electric modicon_m580_bmeh586040s_firmware:

Exploit Probability

EPSS
0.19%
Percentile
40.83%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.