Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6821 (GCVE-0-2019-6821)
Vulnerability from cvelistv5
- CWE-330 - Use of Insufficiently Random Values
URL | Tags | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum |
Version: Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "name": "108366", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108366" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum" } ] } ], "descriptions": [ { "lang": "en", "value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-330", "description": "CWE-330: Use of Insufficiently Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-17T19:34:06", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "name": "108366", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108366" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6821", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum", "version": { "version_data": [ { "version_value": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "name": "108366", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108366" }, { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6821", "datePublished": "2019-05-22T19:42:06", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.471Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6821\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-05-22T20:29:02.183\",\"lastModified\":\"2024-11-21T04:47:13.233\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.\"},{\"lang\":\"es\",\"value\":\"Una CWE-330: Una vulnerabilidad de Uso Insuficientes de valores aleatorios, podr\u00eda generar el secuestro de la conexi\u00f3n TCP cuando se utiliza el protocolo de comunicaci\u00f3n Ethernet en Modicon M580 versiones de firmware anteriores a V2.30, y todas las versiones de firmware de Modicon M340, Modicon Premium, Modicon Quantum.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.30\",\"matchCriteriaId\":\"6C29962C-3387-47C9-AA01-76AF84E4D4A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E876C738-ABF6-4864-98A6-1E06E96A0DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CBA9AD-ECB7-453F-8551-DD176FDE8043\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138681A2-0146-492B-8E10-06849FC27C6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745CC7A7-70FB-4551-8EBF-600B7A6236D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B7CEF7-B9BA-4923-808F-DA2931569EBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"619CFD8D-9652-4AAB-AFC4-796B3F10F61F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F00936E2-E6EF-4ABF-8666-7D83BE424F42\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/108366\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/108366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
fkie_cve-2019-6821
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cybersecurity@se.com | http://www.securityfocus.com/bid/108366 | Third Party Advisory, VDB Entry | |
cybersecurity@se.com | https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01 | Third Party Advisory, US Government Resource | |
cybersecurity@se.com | https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108366 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/ | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C29962C-3387-47C9-AA01-76AF84E4D4A0", "versionEndExcluding": "2.30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*", "matchCriteriaId": "E876C738-ABF6-4864-98A6-1E06E96A0DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05CBA9AD-ECB7-453F-8551-DD176FDE8043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*", "matchCriteriaId": "138681A2-0146-492B-8E10-06849FC27C6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "745CC7A7-70FB-4551-8EBF-600B7A6236D7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9B7CEF7-B9BA-4923-808F-DA2931569EBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "619CFD8D-9652-4AAB-AFC4-796B3F10F61F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00936E2-E6EF-4ABF-8666-7D83BE424F42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum." }, { "lang": "es", "value": "Una CWE-330: Una vulnerabilidad de Uso Insuficientes de valores aleatorios, podr\u00eda generar el secuestro de la conexi\u00f3n TCP cuando se utiliza el protocolo de comunicaci\u00f3n Ethernet en Modicon M580 versiones de firmware anteriores a V2.30, y todas las versiones de firmware de Modicon M340, Modicon Premium, Modicon Quantum." } ], "id": "CVE-2019-6821", "lastModified": "2024-11-21T04:47:13.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-22T20:29:02.183", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108366" }, { "source": "cybersecurity@se.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "source": "cybersecurity@se.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201905-0037
Vulnerability from variot
CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum. plural Modicon The product contains a vulnerability related to the use of insufficient random values.Information may be obtained. Schneider Electric Modicon M580 and others are products of Schneider Electric, France. The Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon Premium is a large programmable logic controller (PLC) for discrete or process applications. Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions. There are insufficient random value exploits in Modicon M580/M340/Premium/Quantum. An attacker could exploit this vulnerability to implement TCP connection hijacking when using Ethernet communications. An attacker can exploit this issue to bypass certain security restrictions, obtain sensitive information and perform unauthorized actions; this may aid in launching further attacks. The following Schneider Electric Modicon products are vulnerable: Modicon M580 versions prior to 2.30 Modicon M340 Modicon Premium Modicon Quantum. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0037", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "modicon m580", "scope": "lt", "trust": 1.8, "vendor": "schneider electric", "version": "2.30" }, { "model": "modicon quantum", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon premium", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon premium plc", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon quantum plc", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "electric modicon m340", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon quantum", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon premium", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon m580", "scope": "lt", "trust": 0.6, "vendor": "schneider", "version": "v2.30" }, { "model": "modicon quantum", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "0" }, { "model": "modicon premium", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "0" }, { "model": "modicon m580", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "2.20" }, { "model": "modicon m340", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "0" }, { "model": "modicon m580", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "2.80" }, { "model": "modicon m580", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "2.30" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m580", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m340", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon quantum", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon premium", "version": "*" } ], "sources": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "BID", "id": "108366" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m340_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m580_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_premium_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_quantum_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004760" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "David Formby \u0026 Raheem Beyah of Fortiphyd Logic and Georgia Tech.", "sources": [ { "db": "BID", "id": "108366" }, { "db": "CNNVD", "id": "CNNVD-201905-798" } ], "trust": 0.9 }, "cve": "CVE-2019-6821", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-6821", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-6821", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-15888", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "264dd250-479d-4b77-9e34-bb3459e250d0", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-158256", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-6821", "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6821", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6821", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6821", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-15888", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201905-798", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-158256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "VULHUB", "id": "VHN-158256" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "CNNVD", "id": "CNNVD-201905-798" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum. plural Modicon The product contains a vulnerability related to the use of insufficient random values.Information may be obtained. Schneider Electric Modicon M580 and others are products of Schneider Electric, France. The Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon Premium is a large programmable logic controller (PLC) for discrete or process applications. Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions. There are insufficient random value exploits in Modicon M580/M340/Premium/Quantum. An attacker could exploit this vulnerability to implement TCP connection hijacking when using Ethernet communications. \nAn attacker can exploit this issue to bypass certain security restrictions, obtain sensitive information and perform unauthorized actions; this may aid in launching further attacks. \nThe following Schneider Electric Modicon products are vulnerable:\nModicon M580 versions prior to 2.30\nModicon M340\nModicon Premium\nModicon Quantum. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2019-6821" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "BID", "id": "108366" }, { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "VULHUB", "id": "VHN-158256" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6821", "trust": 3.6 }, { "db": "ICS CERT", "id": "ICSA-19-136-01", "trust": 2.8 }, { "db": "SCHNEIDER", "id": "SEVD-2019-134-03", "trust": 2.0 }, { "db": "BID", "id": "108366", "trust": 2.0 }, { "db": "CNNVD", "id": "CNNVD-201905-798", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-15888", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-004760", "trust": 0.8 }, { "db": "IVD", "id": "264DD250-479D-4B77-9E34-BB3459E250D0", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-158256", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "VULHUB", "id": "VHN-158256" }, { "db": "BID", "id": "108366" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "CNNVD", "id": "CNNVD-201905-798" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "id": "VAR-201905-0037", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "VULHUB", "id": "VHN-158256" } ], "trust": 1.8935065 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" } ] }, "last_update_date": "2024-11-23T22:33:56.183000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-134-03", "trust": 0.8, "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" }, { "title": "Modicon M580/M340/Premium/Quantum patch with insufficient random value exploits", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/162385" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-330", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158256" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/108366" }, { "trust": 2.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-136-01" }, { "trust": 1.7, "url": "https://www.schneider-electric.com/en/download/document/sevd-2019-134-03/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6821" }, { "trust": 0.9, "url": "http://www.schneider-electric.com/site/home/index.cfm/ww/?selectcountry=true" }, { "trust": 0.9, "url": "https://download.schneider-electric.com/files?p_endoctype=technical+leaflet\u0026p_file_name=sevd-2019-134-03+-+modicon+controller.pdf\u0026p_doc_ref=sevd-2019-134-03" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6821" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-136-01" }, { "trust": 0.6, "url": "https://web.nvd.nist.gov//vuln/detail/cve-2019-6821" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "VULHUB", "id": "VHN-158256" }, { "db": "BID", "id": "108366" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "CNNVD", "id": "CNNVD-201905-798" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "db": "CNVD", "id": "CNVD-2019-15888" }, { "db": "VULHUB", "id": "VHN-158256" }, { "db": "BID", "id": "108366" }, { "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "db": "CNNVD", "id": "CNNVD-201905-798" }, { "db": "NVD", "id": "CVE-2019-6821" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-30T00:00:00", "db": "IVD", "id": "264dd250-479d-4b77-9e34-bb3459e250d0" }, { "date": "2019-05-30T00:00:00", "db": "CNVD", "id": "CNVD-2019-15888" }, { "date": "2019-05-22T00:00:00", "db": "VULHUB", "id": "VHN-158256" }, { "date": "2019-05-14T00:00:00", "db": "BID", "id": "108366" }, { "date": "2019-06-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "date": "2019-05-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-798" }, { "date": "2019-05-22T20:29:02.183000", "db": "NVD", "id": "CVE-2019-6821" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-30T00:00:00", "db": "CNVD", "id": "CNVD-2019-15888" }, { "date": "2019-06-17T00:00:00", "db": "VULHUB", "id": "VHN-158256" }, { "date": "2019-05-14T00:00:00", "db": "BID", "id": "108366" }, { "date": "2019-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-004760" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-798" }, { "date": "2024-11-21T04:47:13.233000", "db": "NVD", "id": "CVE-2019-6821" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-798" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Modicon Vulnerabilities related to insufficient random values in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-004760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-798" } ], "trust": 0.6 } }
ICSA-19-136-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "David Formby", "Raheem Beyah" ], "organization": "Fortiphyd Logic", "summary": "reporting this vulnerability to NCCIC" }, { "organization": "Georgia Tech", "summary": "reporting this vulnerability to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to hijack TCP connections or cause information leakage.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple Sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "France", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-136-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-136-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-136-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-136-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Schneider Electric Modicon Controllers", "tracking": { "current_release_date": "2019-05-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-136-01", "initial_release_date": "2019-05-16T00:00:00.000000Z", "revision_history": [ { "date": "2019-05-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-136-01 Schneider Electric Modicon Quantum Controllers" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon Premium: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Modicon Premium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 2.30", "product": { "name": "Modicon M580: firmware versions prior to Version 2.30", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Modicon M580" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon Quantum: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Modicon Quantum" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon M340: firmware all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Modicon M340" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6821", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "The device has predictable TCP initial sequence numbers that allow attackers to hijack TCP connections carrying unsecured communications.CVE-2019-6821has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6821" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Modicon M580 firmware Version 2.80 is available for download. For more information see Schneider Electric advisory SEVD-2019-134-03", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" }, { "category": "vendor_fix", "details": "Modicon M340: currently, no fix is available. Schneider Electric recommends that affected users set up network segmentation and implement a firewall to block all remote/external access to TCP ports. Configure the Access Control List following the recommendations of the user manual \u201cModicon M340 for Ethernet Communications Modules and Processors User Manual,\u201d in the chapter titled \u201cMessaging Configuration Parameters,\u201d which is available here: https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000" }, { "category": "mitigation", "details": "Schneider Electric recommends that affected users set up network segmentation and implement a firewall to block all remote/external access to TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Configure the Access Control List following the recommendations of the user manual \u201cModicon M340 for Ethernet Communications Modules and Processors User Manual,\u201d in the chapter titled \u201cMessaging Configuration Parameters,\u201d which is available here: https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000" }, { "category": "mitigation", "details": "Modicon Premium and Modicon Quantum: Set up network segmentation and implement a firewall to block all unauthorized access to all TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Set up network segmentation and implement a firewall to block all unauthorized access to all TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "In December 2018, Schneider Electric reported that the Modicon Premium and Quantum controllers reached the End of Commercialization life cycle. For more information, please see Schneider Electric advisory SEVD-2019-134-03", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] } ] }
icsa-19-136-01
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "David Formby", "Raheem Beyah" ], "organization": "Fortiphyd Logic", "summary": "reporting this vulnerability to NCCIC" }, { "organization": "Georgia Tech", "summary": "reporting this vulnerability to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could allow an attacker to hijack TCP connections or cause information leakage.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple Sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "France", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-136-01 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-136-01.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-136-01 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-136-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Schneider Electric Modicon Controllers", "tracking": { "current_release_date": "2019-05-16T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-136-01", "initial_release_date": "2019-05-16T00:00:00.000000Z", "revision_history": [ { "date": "2019-05-16T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-136-01 Schneider Electric Modicon Quantum Controllers" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon Premium: all versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Modicon Premium" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 2.30", "product": { "name": "Modicon M580: firmware versions prior to Version 2.30", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Modicon M580" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon Quantum: all versions", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Modicon Quantum" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "Modicon M340: firmware all versions", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Modicon M340" } ], "category": "vendor", "name": "Schneider Electric Software, LLC" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-6821", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "The device has predictable TCP initial sequence numbers that allow attackers to hijack TCP connections carrying unsecured communications.CVE-2019-6821has been assigned to this vulnerability. A CVSS v3 base score of 5.4 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6821" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Modicon M580 firmware Version 2.80 is available for download. For more information see Schneider Electric advisory SEVD-2019-134-03", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" }, { "category": "vendor_fix", "details": "Modicon M340: currently, no fix is available. Schneider Electric recommends that affected users set up network segmentation and implement a firewall to block all remote/external access to TCP ports. Configure the Access Control List following the recommendations of the user manual \u201cModicon M340 for Ethernet Communications Modules and Processors User Manual,\u201d in the chapter titled \u201cMessaging Configuration Parameters,\u201d which is available here: https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000" }, { "category": "mitigation", "details": "Schneider Electric recommends that affected users set up network segmentation and implement a firewall to block all remote/external access to TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "vendor_fix", "details": "Configure the Access Control List following the recommendations of the user manual \u201cModicon M340 for Ethernet Communications Modules and Processors User Manual,\u201d in the chapter titled \u201cMessaging Configuration Parameters,\u201d which is available here: https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://download.schneiderelectric.com/files?p_enDocType=User+guide\u0026p_File_Name=31007131_K01_000_16.pdf\u0026p_Doc_Ref=31007131K01000" }, { "category": "mitigation", "details": "Modicon Premium and Modicon Quantum: Set up network segmentation and implement a firewall to block all unauthorized access to all TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "Set up network segmentation and implement a firewall to block all unauthorized access to all TCP ports.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "mitigation", "details": "In December 2018, Schneider Electric reported that the Modicon Premium and Quantum controllers reached the End of Commercialization life cycle. For more information, please see Schneider Electric advisory SEVD-2019-134-03", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ] } ] }
cnvd-2019-15888
Vulnerability from cnvd
用户可联系供应商获得补丁信息: https://www.schneider-electric.com/
Name | ['Schneider Electric Modicon M340', 'Schneider Electric Modicon Quantum', 'Schneider Electric Modicon Premium', 'Schneider Electric Modicon M580 <V2.30'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6821", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6821" } }, "description": "Schneider Electric Modicon M580\u7b49\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric Modicon M580\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u81ea\u52a8\u5316\u63a7\u5236\u5668\u3002Schneider Electric Modicon Premium\u662f\u4e00\u6b3e\u7528\u4e8e\u79bb\u6563\u6216\u8fc7\u7a0b\u5e94\u7528\u7684\u5927\u578b\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u3002Schneider Electric Modicon Quantum\u662f\u4e00\u6b3e\u7528\u4e8e\u8fc7\u7a0b\u5e94\u7528\u3001\u9ad8\u53ef\u7528\u6027\u548c\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u7684\u5927\u578b\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u3002\n\nModicon M580/M340/Premium/Quantum\u5b58\u5728\u4e0d\u5145\u5206\u968f\u673a\u503c\u4f7f\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u4f7f\u7528\u4ee5\u592a\u7f51\u901a\u4fe1\u65f6\u5b9e\u73b0TCP\u8fde\u63a5\u52ab\u6301\u3002", "discovererName": "Schneider Electric", "formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.schneider-electric.com/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-15888", "openTime": "2019-05-30", "patchDescription": "Schneider Electric Modicon M580\u7b49\u90fd\u662f\u6cd5\u56fd\u65bd\u8010\u5fb7\u7535\u6c14\uff08Schneider Electric\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Schneider Electric Modicon M580\u662f\u4e00\u6b3e\u53ef\u7f16\u7a0b\u81ea\u52a8\u5316\u63a7\u5236\u5668\u3002Schneider Electric Modicon Premium\u662f\u4e00\u6b3e\u7528\u4e8e\u79bb\u6563\u6216\u8fc7\u7a0b\u5e94\u7528\u7684\u5927\u578b\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u3002Schneider Electric Modicon Quantum\u662f\u4e00\u6b3e\u7528\u4e8e\u8fc7\u7a0b\u5e94\u7528\u3001\u9ad8\u53ef\u7528\u6027\u548c\u5b89\u5168\u89e3\u51b3\u65b9\u6848\u7684\u5927\u578b\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\uff08PLC\uff09\u3002\r\n\r\nModicon M580/M340/Premium/Quantum\u5b58\u5728\u4e0d\u5145\u5206\u968f\u673a\u503c\u4f7f\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u4f7f\u7528\u4ee5\u592a\u7f51\u901a\u4fe1\u65f6\u5b9e\u73b0TCP\u8fde\u63a5\u52ab\u6301\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Modicon M580/M340/Premium/Quantum\u4e0d\u5145\u5206\u968f\u673a\u503c\u4f7f\u7528\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Schneider Electric Modicon M340", "Schneider Electric Modicon Quantum", "Schneider Electric Modicon Premium", "Schneider Electric Modicon M580 \u003cV2.30" ] }, "referenceLink": "https://web.nvd.nist.gov//vuln/detail/CVE-2019-6821", "serverity": "\u4e2d", "submitTime": "2019-05-22", "title": "Modicon M580/M340/Premium/Quantum\u4e0d\u5145\u5206\u968f\u673a\u503c\u4f7f\u7528\u6f0f\u6d1e" }
CERTFR-2019-AVI-232
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | Modicon LMC058 | ||
Schneider Electric | Modicon M340 | Modicon M340 firmware | ||
Schneider Electric | N/A | Modicon LMC078 | ||
Schneider Electric | N/A | Schneider Electric Floating License Manager versions antérieures à V2.3.1.0 | ||
Schneider Electric | N/A | Modicon Premium | ||
Schneider Electric | N/A | Modicon M241 | ||
Schneider Electric | N/A | PacDrive Pro2 | ||
Schneider Electric | N/A | Modicon M100 | ||
Schneider Electric | N/A | 140CRA312xxx | ||
Schneider Electric | N/A | BMxCRA312xx versions antérieures à V2.40 | ||
Schneider Electric | N/A | Modicon M251 | ||
Schneider Electric | N/A | ATV IMC drive controller | ||
Schneider Electric | N/A | Modicon M580 firmware versions antérieures à V2.80 | ||
Schneider Electric | N/A | Modicon M221 | ||
Schneider Electric | N/A | Modicon M258 | ||
Schneider Electric | N/A | TSXETG100 | ||
Schneider Electric | N/A | NET55XX Encoder firmware versions antérieures à 2.1.9.7 | ||
Schneider Electric | N/A | PacDrive Pro | ||
Schneider Electric | N/A | BMX-NOR-0200H firmware versions antérieures à V1.7 IR 19 | ||
Schneider Electric | N/A | Modicon M200 | ||
Schneider Electric | N/A | Modicon Quantum | ||
Schneider Electric | N/A | PacDrive Eco |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Modicon LMC058", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340 firmware", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon LMC078", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Schneider Electric Floating License Manager versions ant\u00e9rieures \u00e0 V2.3.1.0", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Premium", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M241", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "PacDrive Pro2", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M100", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "140CRA312xxx", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "BMxCRA312xx versions ant\u00e9rieures \u00e0 V2.40", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M251", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "ATV IMC drive controller", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580 firmware versions ant\u00e9rieures \u00e0 V2.80", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M221", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M258", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "TSXETG100", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "NET55XX Encoder firmware versions ant\u00e9rieures \u00e0 2.1.9.7", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "PacDrive Pro", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "BMX-NOR-0200H firmware versions ant\u00e9rieures \u00e0 V1.7 IR 19", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M200", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Quantum", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "PacDrive Eco", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-6814", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6814" }, { "name": "CVE-2019-6812", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6812" }, { "name": "CVE-2018-20031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20031" }, { "name": "CVE-2018-20032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20032" }, { "name": "CVE-2018-20034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20034" }, { "name": "CVE-2018-20033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20033" }, { "name": "CVE-2019-6815", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6815" }, { "name": "CVE-2019-6816", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6816" }, { "name": "CVE-2018-7788", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7788" }, { "name": "CVE-2018-7851", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7851" }, { "name": "CVE-2018-7834", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7834" }, { "name": "CVE-2019-6819", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6819" }, { "name": "CVE-2019-6821", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6821" }, { "name": "CVE-2019-6820", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6820" } ], "initial_release_date": "2019-05-17T00:00:00", "last_revision_date": "2019-05-17T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-232", "revisions": [ { "description": "Version initiale", "revision_date": "2019-05-17T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0\ndistance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-06 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-06+-+Modicon+RTU+Module.pdf\u0026p_Doc_Ref=SEVD-2019-134-06" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-10 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-10+-+Modicon+Controller.pdf\u0026p_Doc_Ref=SEVD-2019-134-10" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-05 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-05+-+Modicon+Controller.pdf\u0026p_Doc_Ref=SEVD-2019-134-05" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-09 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-09+-+Modicon+Quantum.pdf\u0026p_Doc_Ref=SEVD-2019-134-09" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-01 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-01+-+Pelco+Endura+NET55XX+Encoder.pdf\u0026p_Doc_Ref=SEVD-2019-134-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-04 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-04+-Schneider+Electric+Floating+License+Manager.pdf\u0026p_Doc_Ref=SEVD-2019-134-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-08 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-08+-+Modicon+Quantum.pdf\u0026p_Doc_Ref=SEVD-2019-134-08" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-03 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-03+-+Modicon+Controller.pdf\u0026p_Doc_Ref=SEVD-2019-134-03" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-02 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-02+-+Modicon+and+PacDrive+controllers.pdf\u0026p_Doc_Ref=SEVD-2019-134-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-07 du 14 mai 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-07+-+ConneXium+Gateway.pdf\u0026p_Doc_Ref=SEVD-2019-134-07" } ] }
gsd-2019-6821
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6821", "description": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.", "id": "GSD-2019-6821" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6821" ], "details": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.", "id": "GSD-2019-6821", "modified": "2023-12-13T01:23:49.171970Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6821", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum", "version": { "version_data": [ { "version_value": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-330: Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "name": "108366", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108366" }, { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/", "refsource": "MISC", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.30", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_quantum_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_quantum:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_premium_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_premium:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6821" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-330" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/" }, { "name": "108366", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108366" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5 } }, "lastModifiedDate": "2022-02-03T14:30Z", "publishedDate": "2019-05-22T20:29Z" } } }
ghsa-pr9h-xjrf-gjcr
Vulnerability from github
CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.
{ "affected": [], "aliases": [ "CVE-2019-6821" ], "database_specific": { "cwe_ids": [ "CWE-330" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-05-22T20:29:00Z", "severity": "HIGH" }, "details": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.", "id": "GHSA-pr9h-xjrf-gjcr", "modified": "2022-05-24T16:46:18Z", "published": "2022-05-24T16:46:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6821" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01" }, { "type": "WEB", "url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/108366" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.