Vulnerabilites related to schneider-electric - hmig5ul8a
CVE-2019-6833 (GCVE-0-2019-6833)
Vulnerability from cvelistv5
Published
2019-09-17 19:36
Modified
2025-09-30 14:36
CWE
  • CWE-754 - – Improper Check for Unusual or Exceptional Conditions
Summary
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
Impacted products
Vendor Product Version
Schneider Electric SE Magelis HMI Panels Version: all versions of HMIGTO
Version: all versions of HMISTO
Version: all versions of XBTGH
Version: all versions of HMIGTU
Version: all versions of HMIGTUX
Version: all versions of HMISCU
Version: all versions of HMISTU
Version: all versions of XBTGT
Version: all versions of HMIGXO
Version: all versions of HMIGXU
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:31:04.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2019-6833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-30T14:36:06.892056Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-30T14:36:19.669Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Magelis HMI Panels",
          "vendor": "Schneider Electric SE",
          "versions": [
            {
              "status": "affected",
              "version": "all versions of HMIGTO"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTO"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGH"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTU"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTUX"
            },
            {
              "status": "affected",
              "version": "all versions of HMISCU"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTU"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGT"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXO"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXU"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-02T12:13:24.000Z",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2019-6833",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Magelis HMI Panels",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all versions of HMIGTO"
                          },
                          {
                            "version_value": "all versions of HMISTO"
                          },
                          {
                            "version_value": "all versions of XBTGH"
                          },
                          {
                            "version_value": "all versions of HMIGTU"
                          },
                          {
                            "version_value": "all versions of HMIGTUX"
                          },
                          {
                            "version_value": "all versions of HMISCU"
                          },
                          {
                            "version_value": "all versions of HMISTU"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of HMIGXO"
                          },
                          {
                            "version_value": "all versions of HMIGXU"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Schneider Electric SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01",
              "refsource": "CONFIRM",
              "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
            },
            {
              "name": "https://security.cse.iitk.ac.in/responsible-disclosure",
              "refsource": "MISC",
              "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2019-6833",
    "datePublished": "2019-09-17T19:36:57.000Z",
    "dateReserved": "2019-01-25T00:00:00.000Z",
    "dateUpdated": "2025-09-30T14:36:19.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-09-17 20:15
Modified
2025-09-30 15:15
Summary
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
Impacted products
Vendor Product Version
schneider-electric hmigto_firmware -
schneider-electric hmigto1300 -
schneider-electric hmigto1310 -
schneider-electric hmigto2300 -
schneider-electric hmigto2310 -
schneider-electric hmigto2315 -
schneider-electric hmigto3510 -
schneider-electric hmigto4310 -
schneider-electric hmigto5310 -
schneider-electric hmigto5315 -
schneider-electric hmigto6310 -
schneider-electric hmigto6315 -
schneider-electric hmisto_firmware -
schneider-electric hmisto501 -
schneider-electric hmisto511 -
schneider-electric hmisto512 -
schneider-electric hmisto531 -
schneider-electric hmisto532 -
schneider-electric hmisto705 -
schneider-electric hmisto715 -
schneider-electric hmisto735 -
schneider-electric xbtgh_firmware -
schneider-electric xbtgh2460 -
schneider-electric hmigtu_firmware -
schneider-electric hmig2u -
schneider-electric hmig3u -
schneider-electric hmig3ufc -
schneider-electric hmig5u -
schneider-electric hmig5u2 -
schneider-electric hmig5ufc -
schneider-electric hmig5ul8a -
schneider-electric hmiscu_firmware -
schneider-electric hmiscu6a5 -
schneider-electric hmiscu6b5 -
schneider-electric hmiscu8a5 -
schneider-electric hmiscu8b5 -
schneider-electric hmistu_firmware -
schneider-electric hmistu655 -
schneider-electric hmistu655w -
schneider-electric hmistu855 -
schneider-electric hmistu855w -
schneider-electric xbtgt_firmware -
schneider-electric xbtgt2430 -
schneider-electric xbtgt2930 -
schneider-electric hmigxo_firmware -
schneider-electric hmigxo -
schneider-electric hmigxu_firmware -
schneider-electric hmigxu35 -
schneider-electric hmigxu55 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6510726D-EADF-49AA-B1CC-44A481E216EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3E3852-4A76-44BA-9836-67C7DB2743B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C1A913-6539-49E7-844A-ED2C28D41C77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C8385FB-E116-4E3C-9BBD-06BC2A3A9354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF3F01C-2C36-4CC4-9D03-905ED11A4204",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B894F4D1-27D7-443C-8DAF-5967FD4C8244",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CEE9FE-04EC-4DFB-944E-C11D891A9D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FF55E8-0AE7-4375-969B-3D0E9E1B3956",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C012A402-6270-4080-A499-8582D63E2110",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E310E6C5-86EA-442D-A8B6-48A0DE51BD75",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A0ECE4-4090-4FF4-86F9-FB7BA6E55A78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D8656F-3FF8-4966-93AA-9C60B9E3BCDB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DDEE23-31A6-4EC7-82AB-8AEB666632BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A89AD4A2-B1D2-4C4F-AD5C-F918FB0998B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68419956-84CF-4671-B188-3FFD3AB64CB6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53726A99-8386-4E59-A216-8958C0276F9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207028CD-EE56-4514-ACEE-F6A725BE9151",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B16CCC7-62E1-4309-8D0C-28394C993EB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02CF4B93-1AE5-4E0C-8574-D3135739726D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F67F0E9C-14DF-4E9D-8F91-016C362B591B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25809843-3CE7-4385-A00D-B59041D57126",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B506E7-30CB-44DD-A9CA-078EF0276807",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA694A26-4B62-4EA8-962D-16F4AD9902E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28C5D119-6FCD-493B-974F-FADFF7400749",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC199C1-D633-4264-B7E6-87C716BBE519",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF2C9FF-6BE3-4016-91A1-3EDDF4BB1DFE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A41ADBA-32EE-406D-9BD0-5D52E6BD2455",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72FE48D-3B73-48DA-BABE-F0871E118E7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E881CC09-2083-4958-A08B-C6A1A6368368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF830232-50AC-4E52-B70C-05C65AAF4148",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C91CAFE-8A82-45DC-BE38-32754FFB1547",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E11C974-4857-4440-982E-B65AD272199E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "101818F1-2F32-462C-95AC-5E86D6226352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1D313B-B49C-4C3D-B5EE-40953E8836EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BAAF924-EA44-4298-A481-328E09919E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD7F9E54-F450-4CA1-8DEA-265645D851E7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E181BEA-64DD-434B-9F05-F1B7622E3E35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B91DC91-138F-4569-B24B-6EF17F22212B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D66FFBEB-1013-4971-A84A-371E817250DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8F304E9-87D2-4AAF-A9A8-5F55CA89818F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7D21AF-BE69-48E2-A269-F60424C0A332",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3692DF-9B21-4B63-B8D2-B4186A466282",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA541D29-0B14-4513-90C2-4D7FD23BEF47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0009BA04-69B1-4996-880B-8040C1853AF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24D13D62-38F0-406C-8EC2-70FDDD2AA3A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C619F99C-7F9A-4477-9A1A-D84A6E4D38EB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "963D9100-111B-43B2-B0A6-AC25A88905B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA28DD48-3CA6-49BF-89A3-7D655A986289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D005BC2-F5DB-405C-A961-7B49FF5CB620",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad CWE-754 - Comprobaci\u00f3n inadecuada de condiciones inusuales o excepcionales en los paneles Magelis HMI (todas las versiones de - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU) congelaci\u00f3n temporal de la HMI cuando se recibe una alta tasa de tramas. Cuando se detiene el ataque, el panel de HMI procesa los comandos almacenados en el b\u00fafer."
    }
  ],
  "id": "CVE-2019-6833",
  "lastModified": "2025-09-30T15:15:39.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2019-09-17T20:15:12.467",
  "references": [
    {
      "source": "cybersecurity@se.com",
      "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
    },
    {
      "source": "cybersecurity@se.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
    }
  ],
  "sourceIdentifier": "cybersecurity@se.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "cybersecurity@se.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}