Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-6828 : Security Advisory and Response

Learn about CVE-2019-6828, a CWE-248: Uncaught Exception vulnerability affecting Schneider Electric SE's Modicon M580, M340, Premium, and Quantum devices, potentially leading to denial of service.

A vulnerability known as CWE-248: Uncaught Exception affects Schneider Electric SE's Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum devices. This vulnerability could lead to a denial of service if specific coils and registers are read over Modbus.

Understanding CVE-2019-6828

This CVE identifies a vulnerability in multiple Schneider Electric SE devices that could result in a denial of service.

What is CVE-2019-6828?

CVE-2019-6828 is a CWE-248: Uncaught Exception vulnerability found in Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum devices. It poses a risk of denial of service when certain coils and registers are accessed over Modbus.

The Impact of CVE-2019-6828

The vulnerability could potentially lead to a denial of service if specific coils and registers are read in the controller over Modbus, affecting the availability of the affected devices.

Technical Details of CVE-2019-6828

This section provides technical details about the vulnerability.

Vulnerability Description

The vulnerability is classified as CWE-248: Uncaught Exception and affects Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum devices.

Affected Systems and Versions

        Modicon M580: firmware version prior to V2.90
        Modicon M340: firmware version prior to V3.10
        Modicon Premium: all versions
        Modicon Quantum: all versions

Exploitation Mechanism

The vulnerability can be exploited by reading specific coils and registers in the controller over Modbus, potentially leading to a denial of service.

Mitigation and Prevention

Protecting systems from CVE-2019-6828 is crucial to ensure security.

Immediate Steps to Take

        Update Modicon M580 firmware to V2.90 or later
        Update Modicon M340 firmware to V3.10 or later
        Implement network segmentation to limit exposure

Long-Term Security Practices

        Regularly monitor and audit Modbus communications
        Train personnel on identifying and responding to potential threats

Patching and Updates

        Apply patches provided by Schneider Electric SE to address the vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now