CVE-2019-6856 (GCVE-0-2019-6856)

Vulnerability from cvelistv5 – Published: 2020-01-06 22:57 – Updated: 2024-08-04 20:31
VLAI?
Summary
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when writing specific physical memory blocks using Modbus TCP.
Severity ?
No CVSS data available.
CWE
  • CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
Impacted products
Vendor Product Version
Schneider Electric SE Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) Affected: Modicon M580
Affected: Modicon M340
Affected: Modicon Quantum
Affected: Modicon Premium (see security notification for specific versions)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:31:04.415Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-20-016-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Modicon M580, Modicon M340, Modicon Quantum,  Modicon Premium (see security notification for specific versions)",
          "vendor": "Schneider Electric SE",
          "versions": [
            {
              "status": "affected",
              "version": "Modicon M580"
            },
            {
              "status": "affected",
              "version": "Modicon M340"
            },
            {
              "status": "affected",
              "version": "Modicon Quantum"
            },
            {
              "status": "affected",
              "version": "Modicon Premium (see security notification for specific versions)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when writing specific physical memory blocks using Modbus TCP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-21T23:04:36",
        "orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
        "shortName": "schneider"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-20-016-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@schneider-electric.com",
          "ID": "CVE-2019-6856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Modicon M580, Modicon M340, Modicon Quantum,  Modicon Premium (see security notification for specific versions)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Modicon M580"
                          },
                          {
                            "version_value": "Modicon M340"
                          },
                          {
                            "version_value": "Modicon Quantum"
                          },
                          {
                            "version_value": "Modicon Premium (see security notification for specific versions)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Schneider Electric SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when writing specific physical memory blocks using Modbus TCP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-754: Improper Check for Unusual or Exceptional Conditions"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01",
              "refsource": "CONFIRM",
              "url": "https://www.se.com/ww/en/download/document/SEVD-2019-344-01"
            },
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-20-016-01",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-20-016-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
    "assignerShortName": "schneider",
    "cveId": "CVE-2019-6856",
    "datePublished": "2020-01-06T22:57:02",
    "dateReserved": "2019-01-25T00:00:00",
    "dateUpdated": "2024-08-04T20:31:04.415Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-6856\",\"sourceIdentifier\":\"cybersecurity@se.com\",\"published\":\"2020-01-06T23:15:11.317\",\"lastModified\":\"2024-11-21T04:47:17.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (see security notification for specific versions) which could cause a Denial of Service when writing specific physical memory blocks using Modbus TCP.\"},{\"lang\":\"es\",\"value\":\"CWE-754: existe una vulnerabilidad de Comprobaci\u00f3n Inapropiada de Condiciones Inusuales o Excepcionales en Modicon M580, Modicon M340, Modicon Quantum, Modicon Premium (v\u00e9ase la notificaci\u00f3n de seguridad para versiones espec\u00edficas) que podr\u00eda causar una Denegaci\u00f3n de Servicio cuando se escriben bloques de memoria f\u00edsica espec\u00edficos usando Modbus TCP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cybersecurity@se.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m580_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.80\",\"matchCriteriaId\":\"6FDEB227-D50B-402C-9C11-E29F52BC10BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E876C738-ABF6-4864-98A6-1E06E96A0DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:modicon_m340_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.01\",\"matchCriteriaId\":\"606AFE88-8C9A-4D18-9209-1193B628669F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:modicon_m340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"138681A2-0146-492B-8E10-06849FC27C6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxh5744m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"6F6FF401-ED15-45EE-9A84-171166BF4414\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxh5744m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B57B894-5AA4-4412-B425-7338CB2FFA3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxh5724m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"70CD95A2-9FAE-4A7E-8331-8904C0E0CE3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxh5724m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F56BA4-6A19-44FB-8555-7360C77F83AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp576634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"E5EEE1F8-0DCA-4D18-A022-5DBE980F3A16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp576634m_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F683564-419D-418B-A4D5-BB203F709DD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57554m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"ED646076-2294-4253-92BF-B95D5D5E87A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57554m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5572E616-5D86-46FF-AEA7-4A12E66F0ED4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp575634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"98B1574C-2FC7-4A3C-B260-D8372A268F4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp575634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57BF89C2-27F8-4FF5-9E4F-4F0CB6C2F0E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57454m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"853895C6-5EDF-4767-9653-F5F7826B4A7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57454m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC537593-1AB7-438E-AB71-EDB469A1DFF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp574634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"EC9FBA4C-DA99-4F22-9168-ECD281B090C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp574634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE60505D-0211-4E8C-B32C-988E25698B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57354m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"DD7766E8-40EB-4C72-8234-C8D997F98F6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57354m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAE46047-D9AF-4720-A130-A0F989423F82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp573634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"C9246F10-84D1-4AE0-BF1A-B61EA1E965A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp573634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80500883-2825-46DD-8ED9-4F324A4494CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57304m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"889586D3-B64F-42DA-8872-DD44C9790881\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57304m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5FDBAB3-C8C2-47F6-ACAA-B89BA53849B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57254m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"B6EBCADE-8F8C-402B-8FB6-62237168E788\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57254m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B75D71-11CA-4DDF-849A-08A9D84C95AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp572634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"33E3F062-3874-4EB6-829B-285B428E982E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp572634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2094F4-976F-44FA-A7E5-93E20A80DA00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57204m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"43BE3D1E-5F7D-409F-A932-073D5A566180\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57204m_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E25651C-E4B5-47A2-A6CE-79F7ECAE246E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp571634m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"D1DEF9B5-6BC0-43A7-AD74-81F9D23BA843\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp571634m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A5DCC8-9E3D-4919-9DE3-73FC8733E73D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57154m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"4E358F77-1F8F-4F2F-A54C-B5F2373EFEE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57154m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC8F0AB-C4A8-40B3-88E0-92F52EA05692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:tsxp57104m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.20\",\"matchCriteriaId\":\"56724F0C-2DA8-4710-9D82-EE51FA9B062C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:tsxp57104m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587226C6-6BE2-4A42-B593-34498F647B24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65150_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"97C6F04E-FEF7-4DA4-A819-7E4C3DA173F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC3E5496-C3D0-4DF4-A9AF-F227F889840E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65160_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"E9552C20-F295-4AB7-A44E-FB1072BAD1B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2AF70-F0BB-4D17-901C-1FCBECDC44FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"1BB8ACFC-C693-4C5A-B256-51FF0835FD69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D7304B0-EE18-454B-B3F0-5EF387285D90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"370F0F62-AA12-496B-8107-EEC24B070621\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164AEEA1-666F-428A-BFCB-5DEEEFE1D771\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67060_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"06F31148-8213-4B01-AA48-D9D7C515E38A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67060:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF2A7A3-89EF-480D-8E6E-20E11CF60A97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67160_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"D6E3B57D-062A-431D-B96F-28463DE757DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3870E952-7A32-43DA-8C66-DE43C862639B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67261_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"370F0F62-AA12-496B-8107-EEC24B070621\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"164AEEA1-666F-428A-BFCB-5DEEEFE1D771\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67260_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"108BA75E-B7B4-4A51-9DB8-B928154DD51A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E4FCBA-4980-4C8F-A185-5E9C4CF9E8B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65860_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"C4D81FBC-7C66-4367-8A0F-7F96C09A56A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65860:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8230FD-0C0A-467C-9BAD-09257739D462\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67861_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"4419CB2D-AABC-4F77-9C75-42ABA62CBA6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67861:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF97B5A6-960F-42BA-A397-09C819A3200C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu65160s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"D793BE48-1025-4C6C-8E7D-82E013DDDE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu65160s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E48F27-F241-4491-AFF7-8BD562F21A52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:140cpu67160s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.52\",\"matchCriteriaId\":\"41654852-0E58-46CC-A734-F59FE9B83990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:140cpu67160s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C1C17A-9111-49B8-A2CE-3A2FB87616F1\"}]}]}],\"references\":[{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-344-01\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-016-01\",\"source\":\"cybersecurity@se.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.se.com/ww/en/download/document/SEVD-2019-344-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-20-016-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…