Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-6847 : Vulnerability Insights and Analysis

Learn about CVE-2019-6847 affecting Modicon M580, M340, and BMxCRA/140CRA modules. Discover the impact, affected systems, exploitation, and mitigation steps.

A vulnerability known as CWE-755 affects Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules, potentially leading to a Denial of Service attack on the FTP service.

Understanding CVE-2019-6847

This CVE involves an improper handling of exceptional conditions in Schneider Electric's Modicon devices.

What is CVE-2019-6847?

The vulnerability in Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules could result in a Denial of Service attack on the FTP service during firmware upgrades.

The Impact of CVE-2019-6847

The vulnerability affects all firmware versions of the mentioned Modicon devices, posing a risk of service disruption through a Denial of Service attack.

Technical Details of CVE-2019-6847

This section provides detailed technical insights into the CVE.

Vulnerability Description

The vulnerability, categorized as CWE-755, arises from improper handling of exceptional conditions in the Modicon devices, potentially leading to a Denial of Service attack on the FTP service.

Affected Systems and Versions

        Affected systems: Modicon M580, Modicon M340, and Modicon BMxCRA / 140CRA modules
        All firmware versions of the affected systems are vulnerable

Exploitation Mechanism

The vulnerability can be exploited when attempting to upgrade the firmware using an incompatible version with the application in the controller via FTP protocol.

Mitigation and Prevention

Protecting systems from CVE-2019-6847 is crucial to ensure security.

Immediate Steps to Take

        Apply security patches provided by Schneider Electric promptly
        Implement network segmentation to limit exposure
        Monitor network traffic for any suspicious activity

Long-Term Security Practices

        Regularly update firmware and software to the latest versions
        Conduct security assessments and penetration testing
        Educate staff on cybersecurity best practices

Patching and Updates

        Stay informed about security advisories from Schneider Electric
        Regularly check for firmware updates and apply them as soon as they are available

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now