var-201910-0576
Vulnerability from variot
A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580 with firmware (version prior to V3.10), Modicon M340 (all firmware versions), and Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the controller with an empty firmware package using FTP protocol. plural Modicon The product contains an exceptional condition handling vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Modicon M580/M340/BMxCRA/140CRA are programmable logic controllers from Schneider Electric.
A denial of service vulnerability exists in the Schneider Electric Modicon M580/M340/BMxCRA/140CRA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201910-0576", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "modicon 140cra", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon bmxcra", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m580", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon m340", "scope": "eq", "trust": 1.0, "vendor": "schneider electric", "version": "*" }, { "model": "modicon 140cra", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon bmxcra", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon m340", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "modicon m580", "scope": null, "trust": 0.8, "vendor": "schneider electric", "version": null }, { "model": "electric modicon m340", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon m580", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon bmxcra", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": "electric modicon 140cra", "scope": null, "trust": 0.6, "vendor": "schneider", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m580", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon m340", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon bmxcra", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "modicon 140cra", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:schneider_electric:modicon_140cra_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_bmxcra_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m340_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:schneider_electric:modicon_m580_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011434" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Jared Rittle of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-414" } ], "trust": 0.6 }, "cve": "CVE-2019-6843", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2019-6843", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2019-41496", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "id": "CVE-2019-6843", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-6843", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6843", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6843", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-41496", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201910-414", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "CNNVD", "id": "CNNVD-201910-414" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A CWE-755: Improper Handling of Exceptional Conditions vulnerability exists in Modicon M580 with firmware (version prior to V3.10), Modicon M340 (all firmware versions), and Modicon BMxCRA and 140CRA modules (all firmware versions), which could cause a Denial of Service attack on the PLC when upgrading the controller with an empty firmware package using FTP protocol. plural Modicon The product contains an exceptional condition handling vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Modicon M580/M340/BMxCRA/140CRA are programmable logic controllers from Schneider Electric. \n\nA denial of service vulnerability exists in the Schneider Electric Modicon M580/M340/BMxCRA/140CRA", "sources": [ { "db": "NVD", "id": "CVE-2019-6843" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6843", "trust": 3.2 }, { "db": "SCHNEIDER", "id": "SEVD-2019-281-02", "trust": 1.6 }, { "db": "CNVD", "id": "CNVD-2019-41496", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201910-414", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-011434", "trust": 0.8 }, { "db": "TALOS", "id": "TALOS-2019-0824", "trust": 0.6 }, { "db": "IVD", "id": "7EAA68F9-E73A-4548-A0C9-A2EB041EC668", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "CNNVD", "id": "CNNVD-201910-414" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "id": "VAR-201910-0576", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" } ], "trust": 1.7978355000000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "ICS" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" } ] }, "last_update_date": "2024-11-23T21:36:37.726000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SEVD-2019-281-02", "trust": 0.8, "url": "https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-281-02" }, { "title": "Patch for Schneider Electric Modicon M580/M340/BMxCRA/140CRA Denial of Service Vulnerability (CNVD-2019-41496)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/190777" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6843" }, { "trust": 1.6, "url": "https://www.se.com/ww/en/download/document/sevd-2019-281-02/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6843" }, { "trust": 0.6, "url": "https://www.schneider-electric.com/ww/en/download/document/sevd-2019-281-02" }, { "trust": 0.6, "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2019-0824" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "CNNVD", "id": "CNNVD-201910-414" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNVD", "id": "CNVD-2019-41496" }, { "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "db": "CNNVD", "id": "CNNVD-201910-414" }, { "db": "NVD", "id": "CVE-2019-6843" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "date": "2019-11-19T00:00:00", "db": "CNVD", "id": "CNVD-2019-41496" }, { "date": "2019-11-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "date": "2019-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-414" }, { "date": "2019-10-29T19:15:21.987000", "db": "NVD", "id": "CVE-2019-6843" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-20T00:00:00", "db": "CNVD", "id": "CNVD-2019-41496" }, { "date": "2019-11-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-011434" }, { "date": "2021-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-414" }, { "date": "2024-11-21T04:47:15.820000", "db": "NVD", "id": "CVE-2019-6843" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Modicon Vulnerability in handling exceptional conditions in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-011434" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "IVD", "id": "7eaa68f9-e73a-4548-a0c9-a2eb041ec668" }, { "db": "CNNVD", "id": "CNNVD-201910-414" } ], "trust": 0.8 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.