CVE-2019-6833 (GCVE-0-2019-6833)
Vulnerability from cvelistv5
Published
2019-09-17 19:36
Modified
2025-09-30 14:36
CWE
  • CWE-754 - – Improper Check for Unusual or Exceptional Conditions
Summary
A CWE-754 – Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.
Impacted products
Vendor Product Version
Schneider Electric SE Magelis HMI Panels Version: all versions of HMIGTO
Version: all versions of HMISTO
Version: all versions of XBTGH
Version: all versions of HMIGTU
Version: all versions of HMIGTUX
Version: all versions of HMISCU
Version: all versions of HMISTU
Version: all versions of XBTGT
Version: all versions of HMIGXO
Version: all versions of HMIGXU
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:31:04.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2019-6833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-30T14:36:06.892056Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-30T14:36:19.669Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Magelis HMI Panels",
          "vendor": "Schneider Electric SE",
          "versions": [
            {
              "status": "affected",
              "version": "all versions of HMIGTO"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTO"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGH"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTU"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGTUX"
            },
            {
              "status": "affected",
              "version": "all versions of HMISCU"
            },
            {
              "status": "affected",
              "version": "all versions of HMISTU"
            },
            {
              "status": "affected",
              "version": "all versions of XBTGT"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXO"
            },
            {
              "status": "affected",
              "version": "all versions of HMIGXU"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-02T12:13:24.000Z",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2019-6833",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Magelis HMI Panels",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "all versions of HMIGTO"
                          },
                          {
                            "version_value": "all versions of HMISTO"
                          },
                          {
                            "version_value": "all versions of XBTGH"
                          },
                          {
                            "version_value": "all versions of HMIGTU"
                          },
                          {
                            "version_value": "all versions of HMIGTUX"
                          },
                          {
                            "version_value": "all versions of HMISCU"
                          },
                          {
                            "version_value": "all versions of HMISTU"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of XBTGT"
                          },
                          {
                            "version_value": "all versions of HMIGXO"
                          },
                          {
                            "version_value": "all versions of HMIGXU"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Schneider Electric SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01",
              "refsource": "CONFIRM",
              "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01"
            },
            {
              "name": "https://security.cse.iitk.ac.in/responsible-disclosure",
              "refsource": "MISC",
              "url": "https://security.cse.iitk.ac.in/responsible-disclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2019-6833",
    "datePublished": "2019-09-17T19:36:57.000Z",
    "dateReserved": "2019-01-25T00:00:00.000Z",
    "dateUpdated": "2025-09-30T14:36:19.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-6833\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-09-17T20:15:12.467\",\"lastModified\":\"2025-09-30T15:15:39.103\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-754 \u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad CWE-754 - Comprobaci\u00f3n inadecuada de condiciones inusuales o excepcionales en los paneles Magelis HMI (todas las versiones de - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU) congelaci\u00f3n temporal de la HMI cuando se recibe una alta tasa de tramas. Cuando se detiene el ataque, el panel de HMI procesa los comandos almacenados en el b\u00fafer.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmigto_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6510726D-EADF-49AA-B1CC-44A481E216EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto1300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E3E3852-4A76-44BA-9836-67C7DB2743B6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto1310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C1A913-6539-49E7-844A-ED2C28D41C77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto2300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8385FB-E116-4E3C-9BBD-06BC2A3A9354\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto2310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF3F01C-2C36-4CC4-9D03-905ED11A4204\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto2315:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B894F4D1-27D7-443C-8DAF-5967FD4C8244\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto3510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CEE9FE-04EC-4DFB-944E-C11D891A9D4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto4310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FF55E8-0AE7-4375-969B-3D0E9E1B3956\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto5310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C012A402-6270-4080-A499-8582D63E2110\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto5315:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E310E6C5-86EA-442D-A8B6-48A0DE51BD75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto6310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A0ECE4-4090-4FF4-86F9-FB7BA6E55A78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigto6315:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1D8656F-3FF8-4966-93AA-9C60B9E3BCDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmisto_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DDEE23-31A6-4EC7-82AB-8AEB666632BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89AD4A2-B1D2-4C4F-AD5C-F918FB0998B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto511:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68419956-84CF-4671-B188-3FFD3AB64CB6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto512:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53726A99-8386-4E59-A216-8958C0276F9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto531:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207028CD-EE56-4514-ACEE-F6A725BE9151\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B16CCC7-62E1-4309-8D0C-28394C993EB4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto705:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02CF4B93-1AE5-4E0C-8574-D3135739726D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto715:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F67F0E9C-14DF-4E9D-8F91-016C362B591B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmisto735:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25809843-3CE7-4385-A00D-B59041D57126\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:xbtgh_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B506E7-30CB-44DD-A9CA-078EF0276807\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:xbtgh2460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA694A26-4B62-4EA8-962D-16F4AD9902E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigtu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28C5D119-6FCD-493B-974F-FADFF7400749\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig2u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC199C1-D633-4264-B7E6-87C716BBE519\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig3u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF2C9FF-6BE3-4016-91A1-3EDDF4BB1DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig3ufc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A41ADBA-32EE-406D-9BD0-5D52E6BD2455\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig5u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72FE48D-3B73-48DA-BABE-F0871E118E7E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig5u2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E881CC09-2083-4958-A08B-C6A1A6368368\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig5ufc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF830232-50AC-4E52-B70C-05C65AAF4148\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmig5ul8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C91CAFE-8A82-45DC-BE38-32754FFB1547\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmiscu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E11C974-4857-4440-982E-B65AD272199E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmiscu6a5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"101818F1-2F32-462C-95AC-5E86D6226352\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmiscu6b5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD1D313B-B49C-4C3D-B5EE-40953E8836EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmiscu8a5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BAAF924-EA44-4298-A481-328E09919E8D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmiscu8b5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7F9E54-F450-4CA1-8DEA-265645D851E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmistu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E181BEA-64DD-434B-9F05-F1B7622E3E35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmistu655:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B91DC91-138F-4569-B24B-6EF17F22212B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmistu655w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66FFBEB-1013-4971-A84A-371E817250DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmistu855:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F304E9-87D2-4AAF-A9A8-5F55CA89818F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmistu855w:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B7D21AF-BE69-48E2-A269-F60424C0A332\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:xbtgt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B3692DF-9B21-4B63-B8D2-B4186A466282\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:xbtgt2430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA541D29-0B14-4513-90C2-4D7FD23BEF47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:xbtgt2930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0009BA04-69B1-4996-880B-8040C1853AF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmigxo_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24D13D62-38F0-406C-8EC2-70FDDD2AA3A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigxo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C619F99C-7F9A-4477-9A1A-D84A6E4D38EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:hmigxu_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"963D9100-111B-43B2-B0A6-AC25A88905B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigxu35:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA28DD48-3CA6-49BF-89A3-7D655A986289\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:hmigxu55:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D005BC2-F5DB-405C-A961-7B49FF5CB620\"}]}]}],\"references\":[{\"url\":\"https://security.cse.iitk.ac.in/responsible-disclosure\",\"source\":\"cybersecurity@se.com\"},{\"url\":\"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.cse.iitk.ac.in/responsible-disclosure\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://security.cse.iitk.ac.in/responsible-disclosure\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T20:31:04.400Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-6833\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-09-30T14:36:06.892056Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-09-30T14:35:56.632Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Schneider Electric SE\", \"product\": \"Magelis HMI Panels\", \"versions\": [{\"status\": \"affected\", \"version\": \"all versions of HMIGTO\"}, {\"status\": \"affected\", \"version\": \"all versions of HMISTO\"}, {\"status\": \"affected\", \"version\": \"all versions of XBTGH\"}, {\"status\": \"affected\", \"version\": \"all versions of HMIGTU\"}, {\"status\": \"affected\", \"version\": \"all versions of HMIGTUX\"}, {\"status\": \"affected\", \"version\": \"all versions of HMISCU\"}, {\"status\": \"affected\", \"version\": \"all versions of HMISTU\"}, {\"status\": \"affected\", \"version\": \"all versions of XBTGT\"}, {\"status\": \"affected\", \"version\": \"all versions of HMIGXO\"}, {\"status\": \"affected\", \"version\": \"all versions of HMIGXU\"}]}], \"references\": [{\"url\": \"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://security.cse.iitk.ac.in/responsible-disclosure\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A CWE-754 \\u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754 \\u2013 Improper Check for Unusual or Exceptional Conditions\"}]}], \"providerMetadata\": {\"orgId\": \"076d1eb6-cfab-4401-b34d-6dfc2a413bdb\", \"shortName\": \"schneider\", \"dateUpdated\": \"2019-10-02T12:13:24.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"all versions of HMIGTO\"}, {\"version_value\": \"all versions of HMISTO\"}, {\"version_value\": \"all versions of XBTGH\"}, {\"version_value\": \"all versions of HMIGTU\"}, {\"version_value\": \"all versions of HMIGTUX\"}, {\"version_value\": \"all versions of HMISCU\"}, {\"version_value\": \"all versions of HMISTU\"}, {\"version_value\": \"all versions of XBTGT\"}, {\"version_value\": \"all versions of XBTGT\"}, {\"version_value\": \"all versions of HMIGXO\"}, {\"version_value\": \"all versions of HMIGXU\"}]}, \"product_name\": \"Magelis HMI Panels\"}]}, \"vendor_name\": \"Schneider Electric SE\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\", \"name\": \"https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-225-01\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://security.cse.iitk.ac.in/responsible-disclosure\", \"name\": \"https://security.cse.iitk.ac.in/responsible-disclosure\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A CWE-754 \\u2013 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Magelis HMI Panels (all versions of - HMIGTO, HMISTO, XBTGH, HMIGTU, HMIGTUX, HMISCU, HMISTU, XBTGT, XBTGT, HMIGXO, HMIGXU), which could cause a temporary freeze of the HMI when a high rate of frames is received. When the attack stops, the buffered commands are processed by the HMI panel.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-754 \\u2013 Improper Check for Unusual or Exceptional Conditions\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-6833\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cybersecurity@schneider-electric.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2019-6833\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-09-30T14:36:19.669Z\", \"dateReserved\": \"2019-01-25T00:00:00.000Z\", \"assignerOrgId\": \"076d1eb6-cfab-4401-b34d-6dfc2a413bdb\", \"datePublished\": \"2019-09-17T19:36:57.000Z\", \"assignerShortName\": \"schneider\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…