{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T21:03:29.573","vulnerabilities":[{"cve":{"id":"CVE-2018-7843","sourceIdentifier":"cybersecurity@se.com","published":"2019-05-22T20:29:01.590","lastModified":"2024-11-21T04:12:51.810","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading memory blocks with an invalid data size or with an invalid data offset in the controller over Modbus."},{"lang":"es","value":"CWE-248: Existe una vulnerabilidad de Excepción no Detectada en todas las versiones de Modicon M580, Modicon M340, Modicon Quantum y Modicon Premium, lo que podría generar una Denegación de Servicio cuando se lee bloques de memoria con un tamaño de datos no válido o con un desplazamiento de datos no válido en el controlador sobre protocolo Modbus."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:N\/I:N\/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"D52D735D-8AB5-40FE-A83F-266977601571"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*","matchCriteriaId":"E876C738-ABF6-4864-98A6-1E06E96A0DF4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"05CBA9AD-ECB7-453F-8551-DD176FDE8043"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*","matchCriteriaId":"138681A2-0146-492B-8E10-06849FC27C6E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"745CC7A7-70FB-4551-8EBF-600B7A6236D7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*","matchCriteriaId":"A9B7CEF7-B9BA-4923-808F-DA2931569EBB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"619CFD8D-9652-4AAB-AFC4-796B3F10F61F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*","matchCriteriaId":"F00936E2-E6EF-4ABF-8666-7D83BE424F42"}]}]}],"references":[{"url":"https:\/\/www.schneider-electric.com\/en\/download\/document\/SEVD-2019-134-11\/","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"https:\/\/www.talosintelligence.com\/vulnerability_reports\/TALOS-2018-0738","source":"cybersecurity@se.com","tags":["Exploit","Third Party Advisory"]},{"url":"https:\/\/www.schneider-electric.com\/en\/download\/document\/SEVD-2019-134-11\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https:\/\/www.talosintelligence.com\/vulnerability_reports\/TALOS-2018-0738","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}