ID

VAR-201909-0045


CVE

CVE-2019-6829


TITLE

Modicon M580 and Modicon M340 Vulnerabilities related to exceptional state handling

Trust: 0.8

sources: JVNDB: JVNDB-2019-009521

DESCRIPTION

A CWE-248: Uncaught Exception vulnerability exists in Modicon M580 (firmware version prior to V2.90) and Modicon M340 (firmware version prior to V3.10), which could cause a possible denial of service when writing to specific memory addresses in the controller over Modbus. Modicon M580 and Modicon M340 Contains a vulnerability in handling exceptional conditions.Service operation interruption (DoS) There is a possibility of being put into a state. Schneider Electric Modicon M580 and Schneider Electric Modicon M340 are products of Schneider Electric. Schneider Electric Modicon M580 is a programmable automation controller. Schneider Electric Modicon M340 is a mid-range PLC (programmable logic controller) for industrial processes and infrastructure. There are security vulnerabilities in Schneider Electric Modicon M580 using firmware before V2.90 and Schneider Electric Modicon M340 using firmware before V3.10. An attacker could exploit this vulnerability to cause a denial of service

Trust: 2.34

sources: NVD: CVE-2019-6829 // JVNDB: JVNDB-2019-009521 // CNVD: CNVD-2019-38870 // IVD: 422fcd15-89fa-4cc7-8516-6f107433b982

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 422fcd15-89fa-4cc7-8516-6f107433b982 // CNVD: CNVD-2019-38870

AFFECTED PRODUCTS

vendor:schneider electricmodel:modicon m340scope:ltversion:3.10

Trust: 1.8

vendor:schneider electricmodel:modicon m580scope:ltversion:2.90

Trust: 1.8

vendor:schneidermodel:electric modicon m340scope:ltversion:v3.10

Trust: 0.6

vendor:schneidermodel:electric modicon m580scope:ltversion:v2.90

Trust: 0.6

vendor:modicon m580model: - scope:eqversion:*

Trust: 0.2

vendor:modicon m340model: - scope:eqversion:*

Trust: 0.2

sources: IVD: 422fcd15-89fa-4cc7-8516-6f107433b982 // CNVD: CNVD-2019-38870 // JVNDB: JVNDB-2019-009521 // NVD: CVE-2019-6829

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-6829
value: HIGH

Trust: 1.0

NVD: CVE-2019-6829
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-38870
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201908-918
value: HIGH

Trust: 0.6

IVD: 422fcd15-89fa-4cc7-8516-6f107433b982
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2019-6829
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-38870
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 422fcd15-89fa-4cc7-8516-6f107433b982
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-6829
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-6829
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 422fcd15-89fa-4cc7-8516-6f107433b982 // CNVD: CNVD-2019-38870 // JVNDB: JVNDB-2019-009521 // CNNVD: CNNVD-201908-918 // NVD: CVE-2019-6829

PROBLEMTYPE DATA

problemtype:CWE-755

Trust: 1.8

problemtype:CWE-248

Trust: 1.0

sources: JVNDB: JVNDB-2019-009521 // NVD: CVE-2019-6829

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201908-918

TYPE

other

Trust: 0.8

sources: IVD: 422fcd15-89fa-4cc7-8516-6f107433b982 // CNNVD: CNNVD-201908-918

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009521

PATCH

title:SEVD-2019-134-11url:https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/

Trust: 0.8

title:Patch for Schneider Electric Modicon M340 and Modicon M580 Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/188179

Trust: 0.6

title:Schneider Electric Modicon M580 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=96603

Trust: 0.6

sources: CNVD: CNVD-2019-38870 // JVNDB: JVNDB-2019-009521 // CNNVD: CNNVD-201908-918

EXTERNAL IDS

db:NVDid:CVE-2019-6829

Trust: 3.2

db:SCHNEIDERid:SEVD-2019-134-11

Trust: 2.2

db:CNVDid:CNVD-2019-38870

Trust: 0.8

db:CNNVDid:CNNVD-201908-918

Trust: 0.8

db:JVNDBid:JVNDB-2019-009521

Trust: 0.8

db:TALOSid:TALOS-2019-0807

Trust: 0.6

db:IVDid:422FCD15-89FA-4CC7-8516-6F107433B982

Trust: 0.2

sources: IVD: 422fcd15-89fa-4cc7-8516-6f107433b982 // CNVD: CNVD-2019-38870 // JVNDB: JVNDB-2019-009521 // CNNVD: CNNVD-201908-918 // NVD: CVE-2019-6829

REFERENCES

url:https://www.schneider-electric.com/en/download/document/sevd-2019-134-11/

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-6829

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6829

Trust: 0.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2019-0807

Trust: 0.6

sources: CNVD: CNVD-2019-38870 // JVNDB: JVNDB-2019-009521 // CNNVD: CNNVD-201908-918 // NVD: CVE-2019-6829

CREDITS

Discovered by Jared Rittle of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201908-918

SOURCES

db:IVDid:422fcd15-89fa-4cc7-8516-6f107433b982
db:CNVDid:CNVD-2019-38870
db:JVNDBid:JVNDB-2019-009521
db:CNNVDid:CNNVD-201908-918
db:NVDid:CVE-2019-6829

LAST UPDATE DATE

2024-11-23T21:52:12.672000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-38870date:2019-11-04T00:00:00
db:JVNDBid:JVNDB-2019-009521date:2019-09-24T00:00:00
db:CNNVDid:CNNVD-201908-918date:2022-03-10T00:00:00
db:NVDid:CVE-2019-6829date:2024-11-21T04:47:14.157

SOURCES RELEASE DATE

db:IVDid:422fcd15-89fa-4cc7-8516-6f107433b982date:2019-11-04T00:00:00
db:CNVDid:CNVD-2019-38870date:2019-11-01T00:00:00
db:JVNDBid:JVNDB-2019-009521date:2019-09-24T00:00:00
db:CNNVDid:CNNVD-201908-918date:2019-08-13T00:00:00
db:NVDid:CVE-2019-6829date:2019-09-17T20:15:12.203