Vulnerabilites related to schneider-electric - hmig3u
Vulnerability from fkie_nvd
Published
2021-01-26 18:15
Modified
2024-11-21 05:22
Severity ?
Summary
A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure™ Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DB915E-0D1C-40C9-A4D2-D078BE03F27C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:schneider-electric:ecostruxure_operator_terminal_expert:3.1:sp1a:*:*:*:*:*:*",
              "matchCriteriaId": "BACE1852-347B-4311-9CCB-D8FFDCD0FECA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmi_sto_501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65EC4B3-11C8-4D04-BC69-3DD258304B87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmi_sto_511:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD340565-725B-4453-9B24-4C86644F9D34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmi_sto_512:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C386B6A-3F2A-4F56-9651-FFD974EDB774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmi_sto_531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7FC9FA9-B98B-4C51-A349-9DF6FB36E1B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmi_sto_532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E26C0B22-12A9-44CF-BFE4-AEC4D066ACCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF2C9FF-6BE3-4016-91A1-3EDDF4BB1DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9B4D538-DC2F-4DAE-A036-A577E509D1CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72FE48D-3B73-48DA-BABE-F0871E118E7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E881CC09-2083-4958-A08B-C6A1A6368368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmist6200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD84D5B-217A-4FF5-94E5-91541CA61EF5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmist6400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16C13321-9184-4081-A11A-8C427BB4BE71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmist6500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3290B53-034D-4DDB-AFA3-5D91A10725E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmist6600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "570DB15C-328D-42CD-B82C-ED8A817F74FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmist6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6B0D00-4CA9-4012-92A8-0D0634FBB4BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:schneider-electric:pro-face_blue:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "954E2CC0-2CB2-47BE-89E2-E834435CB667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:schneider-electric:pro-face_blue:3.1:sp1a:*:*:*:*:*:*",
              "matchCriteriaId": "80985893-C9FE-44C0-B388-76B8CEA14DB6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4104g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B273E19D-7E4C-4437-AB67-49CAF24FA352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4104w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7F327BA-197B-4BFA-9FE6-E40A3E7FED93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4105g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8750204E-2333-4163-A88A-7AC0D79B0B3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4105w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D39C42-32BE-45DB-9590-0E382C76D0D8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4106g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EE3958-E7E2-4CA7-BBFB-3015EFAD957C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4106w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "437A78A0-2D71-442F-A96F-BF34FC6E406C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4107g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91285194-9241-4B4C-9BC5-EDDEC769A191",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:gp-4107w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7DD410-DC45-4E7C-AD92-B7F236376D21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5400wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43886AEE-C7EB-46CC-86FC-DA401BAED53A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5500tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F839018-F28F-42C9-A725-EA564B29BCA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5500wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B7D645-5E75-4322-A725-5E87175CFB38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5600ta:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF5F2C5B-F295-429E-9176-B17F3A368001",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9E6A3B-E4AD-404F-84BC-40A43E5B6190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5600wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6791B663-7EA9-46F4-A1B2-E0FA6892C02E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5660tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B18FDD-893B-449E-AA2F-17DFEC641450",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5700tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65029B55-0B79-41D0-A595-B52EF289608F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5700wc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE93DF3-238B-41A0-98A6-95C9198597CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5800wc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08BD83A7-89E6-495A-9614-34036D973463",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5b00:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "674CC67D-7FFD-45C4-8F55-3B88D9573A8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5b10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71C88DF-8F96-4CB1-8DB6-0AC4D518A316",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:sp-5b41:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57403D3-FBC8-4223-A46E-8AEAE0FFC555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:st-6200wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FE1CEF1-B73A-43FC-9ED9-E3710C4C41B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:st-6400wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C96ACBC-B832-44AA-B36A-33EEA69CD963",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:st-6500wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24789BC-38C9-483B-9A99-A460D1ED41E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:st-6600wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF5CB30-8F1D-4ECE-9AE7-60D0FDAD3FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:st-6700wa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A233C5-3E7E-4911-AF51-7C8271E2747F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure\u2122 Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI."
    },
    {
      "lang": "es",
      "value": "CWE-20: Se presenta una vulnerabilidad de Comprobaci\u00f3n Inapropiada de la Entrada en EcoStruxure\u2122 Operator Terminal Expert y Pro-face BLUE (detalles de la versi\u00f3n en la notificaci\u00f3n) que podr\u00eda causar una ejecuci\u00f3n de c\u00f3digo arbitraria cuando la funcionalidad Ethernet Download est\u00e1 habilitada en la HMI"
    }
  ],
  "id": "CVE-2020-28221",
  "lastModified": "2024-11-21T05:22:30.077",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-01-26T18:15:47.600",
  "references": [
    {
      "source": "cybersecurity@se.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/"
    }
  ],
  "sourceIdentifier": "cybersecurity@se.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "cybersecurity@se.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-17 20:15
Modified
2025-09-30 15:15
Summary
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
Impacted products
Vendor Product Version
schneider-electric hmigto_firmware -
schneider-electric hmigto1300 -
schneider-electric hmigto1310 -
schneider-electric hmigto2300 -
schneider-electric hmigto2310 -
schneider-electric hmigto2315 -
schneider-electric hmigto3510 -
schneider-electric hmigto4310 -
schneider-electric hmigto5310 -
schneider-electric hmigto5315 -
schneider-electric hmigto6310 -
schneider-electric hmigto6315 -
schneider-electric hmisto_firmware -
schneider-electric hmisto501 -
schneider-electric hmisto511 -
schneider-electric hmisto512 -
schneider-electric hmisto531 -
schneider-electric hmisto532 -
schneider-electric hmisto705 -
schneider-electric hmisto715 -
schneider-electric hmisto735 -
schneider-electric xbtgh_firmware -
schneider-electric xbtgh2460 -
schneider-electric hmigtu_firmware -
schneider-electric hmig2u -
schneider-electric hmig3u -
schneider-electric hmig3ufc -
schneider-electric hmig5u -
schneider-electric hmig5u2 -
schneider-electric hmig5ufc -
schneider-electric hmig5ul8a -
schneider-electric hmiscu_firmware -
schneider-electric hmiscu6a5 -
schneider-electric hmiscu6b5 -
schneider-electric hmiscu8a5 -
schneider-electric hmiscu8b5 -
schneider-electric hmistu_firmware -
schneider-electric hmistu655 -
schneider-electric hmistu655w -
schneider-electric hmistu855 -
schneider-electric hmistu855w -
schneider-electric xbtgt_firmware -
schneider-electric xbtgt2430 -
schneider-electric xbtgt2930 -
schneider-electric hmigxo_firmware -
schneider-electric hmigxo -
schneider-electric hmigxu_firmware -
schneider-electric hmigxu35 -
schneider-electric hmigxu55 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6510726D-EADF-49AA-B1CC-44A481E216EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3E3852-4A76-44BA-9836-67C7DB2743B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C1A913-6539-49E7-844A-ED2C28D41C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8385FB-E116-4E3C-9BBD-06BC2A3A9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF3F01C-2C36-4CC4-9D03-905ED11A4204",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B894F4D1-27D7-443C-8DAF-5967FD4C8244",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CEE9FE-04EC-4DFB-944E-C11D891A9D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FF55E8-0AE7-4375-969B-3D0E9E1B3956",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C012A402-6270-4080-A499-8582D63E2110",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E310E6C5-86EA-442D-A8B6-48A0DE51BD75",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A0ECE4-4090-4FF4-86F9-FB7BA6E55A78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D8656F-3FF8-4966-93AA-9C60B9E3BCDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DDEE23-31A6-4EC7-82AB-8AEB666632BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A89AD4A2-B1D2-4C4F-AD5C-F918FB0998B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68419956-84CF-4671-B188-3FFD3AB64CB6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53726A99-8386-4E59-A216-8958C0276F9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207028CD-EE56-4514-ACEE-F6A725BE9151",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16CCC7-62E1-4309-8D0C-28394C993EB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CF4B93-1AE5-4E0C-8574-D3135739726D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F67F0E9C-14DF-4E9D-8F91-016C362B591B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25809843-3CE7-4385-A00D-B59041D57126",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B506E7-30CB-44DD-A9CA-078EF0276807",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA694A26-4B62-4EA8-962D-16F4AD9902E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28C5D119-6FCD-493B-974F-FADFF7400749",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC199C1-D633-4264-B7E6-87C716BBE519",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF2C9FF-6BE3-4016-91A1-3EDDF4BB1DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A41ADBA-32EE-406D-9BD0-5D52E6BD2455",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72FE48D-3B73-48DA-BABE-F0871E118E7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E881CC09-2083-4958-A08B-C6A1A6368368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF830232-50AC-4E52-B70C-05C65AAF4148",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C91CAFE-8A82-45DC-BE38-32754FFB1547",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E11C974-4857-4440-982E-B65AD272199E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "101818F1-2F32-462C-95AC-5E86D6226352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1D313B-B49C-4C3D-B5EE-40953E8836EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAAF924-EA44-4298-A481-328E09919E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7F9E54-F450-4CA1-8DEA-265645D851E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E181BEA-64DD-434B-9F05-F1B7622E3E35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B91DC91-138F-4569-B24B-6EF17F22212B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D66FFBEB-1013-4971-A84A-371E817250DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F304E9-87D2-4AAF-A9A8-5F55CA89818F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7D21AF-BE69-48E2-A269-F60424C0A332",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3692DF-9B21-4B63-B8D2-B4186A466282",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA541D29-0B14-4513-90C2-4D7FD23BEF47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0009BA04-69B1-4996-880B-8040C1853AF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D13D62-38F0-406C-8EC2-70FDDD2AA3A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C619F99C-7F9A-4477-9A1A-D84A6E4D38EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "963D9100-111B-43B2-B0A6-AC25A88905B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA28DD48-3CA6-49BF-89A3-7D655A986289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D005BC2-F5DB-405C-A961-7B49FF5CB620",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad CWE-754 - Comprobaci\u00f3n inadecuada de condiciones inusuales o excepcionales en los paneles Magelis HMI (todas las versiones de - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU) congelaci\u00f3n temporal de la HMI cuando se recibe una alta tasa de tramas. Cuando se detiene el ataque, el panel de HMI procesa los comandos almacenados en el b\u00fafer."
    }
  ],
  "id": "CVE-2019-6833",
  "lastModified": "2025-09-30T15:15:39.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2019-09-17T20:15:12.467",
  "references": [
    {
      "source": "cybersecurity@se.com",
      "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
    },
    {
      "source": "cybersecurity@se.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
    }
  ],
  "sourceIdentifier": "cybersecurity@se.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "cybersecurity@se.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2019-6833 (GCVE-0-2019-6833)
Vulnerability from cvelistv5
Published
2019-09-17 19:36
Modified
2025-09-30 14:36
CWE
  • CWE-754 - – Improper Check for Unusual or Exceptional Conditions
Summary
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
Impacted products
Vendor Product Version
Schneider Electric SE Magelis HMI Panels Version: all versions of HMIGTO
Version: all versions of HMISTO
Version: all versions of XBTGH
Version: all versions of HMIGTU
Version: all versions of HMIGTUX
Version: all versions of HMISCU
Version: all versions of HMISTU
Version: all versions of XBTGT
Version: all versions of HMIGXO
Version: all versions of HMIGXU
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:31:04.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2019-6833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-30T14:36:06.892056Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-30T14:36:19.669Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Magelis HMI Panels",
          "vendor": "Schneider Electric SE",
          "versions": [
            {
              "status": "affected",
              "version": "all versions of HMIGTO"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTO"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGH"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTU"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTUX"
            },
            {
              "status": "affected",
              "version": "all versions of HMISCU"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTU"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGT"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXO"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXU"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-02T12:13:24.000Z",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2019-6833",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Magelis HMI Panels",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all versions of HMIGTO"
                          },
                          {
                            "version_value": "all versions of HMISTO"
                          },
                          {
                            "version_value": "all versions of XBTGH"
                          },
                          {
                            "version_value": "all versions of HMIGTU"
                          },
                          {
                            "version_value": "all versions of HMIGTUX"
                          },
                          {
                            "version_value": "all versions of HMISCU"
                          },
                          {
                            "version_value": "all versions of HMISTU"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of HMIGXO"
                          },
                          {
                            "version_value": "all versions of HMIGXU"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Schneider Electric SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01",
              "refsource": "CONFIRM",
              "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
            },
            {
              "name": "https://security.cse.iitk.ac.in/responsible-disclosure",
              "refsource": "MISC",
              "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2019-6833",
    "datePublished": "2019-09-17T19:36:57.000Z",
    "dateReserved": "2019-01-25T00:00:00.000Z",
    "dateUpdated": "2025-09-30T14:36:19.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-28221 (GCVE-0-2020-28221)
Vulnerability from cvelistv5
Published
2021-01-25 17:08
Modified
2024-08-04 16:33
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure™ Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI.
References
Impacted products
Vendor Product Version
n/a EcoStruxure™ Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series Version: EcoStruxure™ Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:33:58.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EcoStruxure\u2122 Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "EcoStruxure\u2122 Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure\u2122 Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-25T17:08:37",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2020-28221",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EcoStruxure\u2122 Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "EcoStruxure\u2122 Operator Terminal Expert 3.1 Service Pack 1A and prior running on Harmony HMIs HMIST6 Series, HMIG3U in HMIGTU Series, HMISTO Series and Pro-face BLUE 3.1 Service Pack 1A and prior running on Pro-face HMIs: ST6000 Series, SP-5B41 in SP5000 Series, GP4100 Series"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-20: Improper Input Validation vulnerability exists in EcoStruxure\u2122 Operator Terminal Expert and Pro-face BLUE (version details in the notification) that could cause arbitrary code execution when the Ethernet Download feature is enable on the HMI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20: Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/",
              "refsource": "MISC",
              "url": "https://www.se.com/ww/en/download/document/SEVD-2021-012-01/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2020-28221",
    "datePublished": "2021-01-25T17:08:37",
    "dateReserved": "2020-11-05T00:00:00",
    "dateUpdated": "2024-08-04T16:33:58.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}