Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-18995 : What You Need to Know

Discover the impact of CVE-2019-18995 on ABB PB610 Panel Builder 600 versions before 2.8.0.424. Learn about the vulnerability, its technical details, and mitigation steps.

A vulnerability in ABB PB610 Panel Builder 600 versions prior to 2.8.0.424 allows attackers to launch a denial of service attack on HMISimulator.

Understanding CVE-2019-18995

The vulnerability lies in the HMISimulator feature of ABB PB610 Panel Builder 600, where HTTP requests' content-length field is not properly verified.

What is CVE-2019-18995?

The HMISimulator feature in ABB PB610 Panel Builder 600 versions before 2.8.0.424 fails to validate the content-length field in HTTP requests, enabling attackers to disrupt HMISimulator through manipulated HTTP requests.

The Impact of CVE-2019-18995

        CVSS Base Score: 4.3 (Medium Severity)
        Attack Vector: Adjacent Network
        Attack Complexity: Low
        Availability Impact: Low
        No impact on Confidentiality or Integrity
        Attackers can exploit this vulnerability without requiring privileges or user interaction.

Technical Details of CVE-2019-18995

The technical details of the vulnerability in ABB PB610 Panel Builder 600.

Vulnerability Description

The HMISimulator component fails to validate the content-length field in HTTP requests, allowing for denial of service attacks via crafted HTTP requests.

Affected Systems and Versions

        Affected Product: PB610 Panel Builder 600
        Vendor: ABB
        Affected Versions: <= 2.8.0.424 (Custom Version)

Exploitation Mechanism

Attackers can exploit this vulnerability by sending manipulated HTTP requests that modify the content-length setting, leading to a denial of service on HMISimulator.

Mitigation and Prevention

Steps to mitigate and prevent the CVE-2019-18995 vulnerability.

Immediate Steps to Take

        Update to the latest version of ABB PB610 Panel Builder 600.
        Implement network security measures to filter out potentially malicious HTTP requests.

Long-Term Security Practices

        Regularly monitor and audit HTTP traffic for anomalies.
        Train staff on recognizing and responding to suspicious HTTP requests.

Patching and Updates

        Apply patches and updates provided by ABB to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now