Description Preview
CVE-2019-6829 describes a vulnerability categorized as CWE-248: Uncaught Exception, which affects Schneider Electric's Modicon M580 (firmware version prior to V2.90) and Modicon M340 (firmware version prior to V3.10). This vulnerability can be exploited by sending specific commands over the Modbus protocol that write to certain memory addresses in the controller. If exploited, this could result in a denial of service condition, impacting the availability of the affected devices.
Overview
-
Affected Products:
- Modicon M580 (firmware version prior to V2.90)
- Modicon M340 (firmware version prior to V3.10)
-
Vulnerability Type:
- CWE-248: Uncaught Exception
-
Impact:
- Possible denial of service when specific memory addresses are targeted over Modbus.
Remediation
To mitigate the risk associated with CVE-2019-6829, users are advised to update their firmware to the following versions:
- Upgrade Modicon M580 to firmware version V2.90 or later.
- Upgrade Modicon M340 to firmware version V3.10 or later.
It is recommended to regularly check for firmware updates and apply them promptly to ensure the security and reliability of the devices.
References
- Schneider Electric Security Notification: SEVD-2019-134-11
- CVE Details: CVE-2019-6829
These references provide additional context and guidance regarding the vulnerability and its remediation.
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing: Low
- UtilitiesUtilities: Low
- Public AdministrationPublic Administration: Low
- Transportation & WarehousingTransportation & Warehousing: Low
- Other Services (except Public Administration)Other Services (except Public Administration): Low
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services: Low
- Accommodation & Food ServicesAccommodation & Food Services: Low
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services: Low
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting: Low
- Arts, Entertainment & RecreationArts, Entertainment & Recreation: Low
- ConstructionConstruction: Low
- Educational ServicesEducational Services: Low
- Finance and InsuranceFinance and Insurance: Low
- Health Care & Social AssistanceHealth Care & Social Assistance: Low
- InformationInformation: Low
- Management of Companies & EnterprisesManagement of Companies & Enterprises: Low
- MiningMining: Low
- Real Estate Rental & LeasingReal Estate Rental & Leasing: Low
- Retail TradeRetail Trade: Low
- Wholesale TradeWholesale Trade: Low