Vulnerabilites related to Kunbus - PR100088 Modbus gateway
cve-2019-6531
Vulnerability from cvelistv5
Published
2019-04-02 19:15
Modified
2024-08-04 20:23
Severity ?
EPSS score ?
Summary
An attacker could retrieve passwords from a HTTP GET request from the Kunbus PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) if the attacker is in an MITM position.
References
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Kunbus | PR100088 Modbus gateway |
Version: All versions prior to Release R02 (or Software Version 1.1.13166) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:23:21.405Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PR100088 Modbus gateway", "vendor": "Kunbus", "versions": [ { "status": "affected", "version": "All versions prior to Release R02 (or Software Version 1.1.13166)" } ] } ], "datePublic": "2019-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker could retrieve passwords from a HTTP GET request from the Kunbus PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) if the attacker is in an MITM position." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-598", "description": "INFORMATION EXPOSURE THROUGH QUERY STRINGS IN GET REQUEST CWE-598", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T19:15:11", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-6531", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PR100088 Modbus gateway", "version": { "version_data": [ { "version_value": "All versions prior to Release R02 (or Software Version 1.1.13166)" } ] } } ] }, "vendor_name": "Kunbus" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker could retrieve passwords from a HTTP GET request from the Kunbus PR100088 Modbus gateway versions prior to Release R02 (or Software Version 1.1.13166) if the attacker is in an MITM position." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "INFORMATION EXPOSURE THROUGH QUERY STRINGS IN GET REQUEST CWE-598" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-036-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-6531", "datePublished": "2019-04-02T19:15:11", "dateReserved": "2019-01-22T00:00:00", "dateUpdated": "2024-08-04T20:23:21.405Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202001-0246
Vulnerability from variot
An attacker could specially craft an FTP request that could crash the PR100088 Modbus gateway versions prior to release R02 (or Software Version 1.1.13166). PR100088 Modbus gateway Contains an input validation vulnerability.Denial of service (DoS) May be in a state. Kunbus PR100088 Modbus is an industrial Ethernet gateway device from German Kunbus company.
An input validation error vulnerability exists in versions prior to Kunbus PR100088 Modbus Release R02. The vulnerability stems from a network system or product that did not properly validate the input data. No detailed vulnerability details are provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0246", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pr100088 modbus gateway", "scope": "lt", "trust": 1.0, "vendor": "kunbus", "version": "1.1.13166" }, { "model": "pr100088 modbus gateway", "scope": "lt", "trust": 0.8, "vendor": "kunbus", "version": "r02" }, { "model": "pr100088 modbus \u003crelease r02", "scope": null, "trust": 0.6, "vendor": "kunbus", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:kunbus:pr100088_modbus_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013998" } ] }, "cve": "CVE-2019-6529", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2019-6529", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "MULTIPLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.4, "id": "CNVD-2020-14074", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "id": "CVE-2019-6529", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-6529", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6529", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6529", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-14074", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201902-569", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNNVD", "id": "CNNVD-201902-569" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An attacker could specially craft an FTP request that could crash the PR100088 Modbus gateway versions prior to release R02 (or Software Version 1.1.13166). PR100088 Modbus gateway Contains an input validation vulnerability.Denial of service (DoS) May be in a state. Kunbus PR100088 Modbus is an industrial Ethernet gateway device from German Kunbus company. \n\r\n\r\nAn input validation error vulnerability exists in versions prior to Kunbus PR100088 Modbus Release R02. The vulnerability stems from a network system or product that did not properly validate the input data. No detailed vulnerability details are provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2019-6529" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNVD", "id": "CNVD-2020-14074" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6529", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-19-036-05", "trust": 2.4 }, { "db": "AUSCERT", "id": "ESB-2019.0343", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2019-013998", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-14074", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201902-569", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNNVD", "id": "CNNVD-201902-569" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "id": "VAR-202001-0246", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" } ] }, "last_update_date": "2024-11-23T22:16:40.807000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.kunbus.com/" }, { "title": "Patch for Kunbus PR100088 Modbus Input Validation Error Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/205249" }, { "title": "Kunbus PR100088 Modbus Gateway Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89370" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNNVD", "id": "CNNVD-201902-569" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-036-05" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6529" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/75066" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6529" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNNVD", "id": "CNNVD-201902-569" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "db": "CNNVD", "id": "CNNVD-201902-569" }, { "db": "NVD", "id": "CVE-2019-6529" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-14074" }, { "date": "2020-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "date": "2019-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-569" }, { "date": "2020-01-07T21:15:10.540000", "db": "NVD", "id": "CVE-2019-6529" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-02-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-14074" }, { "date": "2020-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013998" }, { "date": "2020-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201902-569" }, { "date": "2024-11-21T04:46:38.153000", "db": "NVD", "id": "CVE-2019-6529" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-569" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kunbus PR100088 Modbus Input Validation Error Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-14074" }, { "db": "CNNVD", "id": "CNNVD-201902-569" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201902-569" } ], "trust": 0.6 } }