SOCOMEC MODULYS GP (UPDATE A)
SOCOMEC MODULYS GP Net Vision firmware versions 7.20 and earlier contain an information disclosure vulnerability (CWE-261: Improper Authentication). An authenticated attacker on the local network can obtain sensitive information from the target system through a user interaction attack vector (e.g., malicious link or attachment). The vulnerability requires the user to click or open something, but once triggered, could expose configuration details, credentials, or other sensitive data stored on the UPS controller.
- Attacker must be on the same network segment (local network or VPN) as the MODULYS GP device
- A user with access to Net Vision interface must be socially engineered to click a link or open a file
- Vulnerable version 7.20 or earlier of Net Vision FW must be deployed
- User interaction required (victim must take action)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/815b4b46-27b8-4eee-85b2-cb5bdf7279d8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.