Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-6574 : Exploit Details and Defense Strategies

Discover the impact of CVE-2019-6574 affecting SINAMICS PERFECT HARMONY GH180 with NXG I and NXG II controls. Learn about the exploitation mechanism and mitigation steps.

A vulnerability has been discovered in SINAMICS PERFECT HARMONY GH180 with NXG I control and NXG II control, potentially compromising system availability.

Understanding CVE-2019-6574

What is CVE-2019-6574?

This CVE identifies a vulnerability in SINAMICS PERFECT HARMONY GH180 with NXG I and NXG II controls, allowing unauthorized access to restart the controller.

The Impact of CVE-2019-6574

The vulnerability could lead to a denial of service attack, affecting the availability of the affected systems.

Technical Details of CVE-2019-6574

Vulnerability Description

        Vulnerability in SINAMICS PERFECT HARMONY GH180 with NXG I and NXG II controls
        Misconfigured Parameter Read/Write execution via Field bus network
        Unauthorized access can cause the controller to restart

Affected Systems and Versions

        SINAMICS PERFECT HARMONY GH180 with NXG I control, MLFBs: 6SR2...-, 6SR3...-, 6SR4...-
        SINAMICS PERFECT HARMONY GH180 with NXG II control, MLFBs: 6SR2...-, 6SR3...-, 6SR4...-
        All Versions with option G21, G22, G23, G26, G28, G31, G32, G38, G43 or G46

Exploitation Mechanism

        Attacker with network access can exploit the vulnerability
        No privileges or user interaction required for exploitation

Mitigation and Prevention

Immediate Steps to Take

        Ensure proper configuration of Parameter Read/Write execution
        Implement network security measures to prevent unauthorized access

Long-Term Security Practices

        Regularly monitor and update system configurations
        Conduct security audits to identify and address vulnerabilities

Patching and Updates

        Apply patches and updates provided by Siemens AG to address the vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now