First published: Wed May 22 2019(Updated: )
CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Modicon M580 Firmware | <2.30 | |
Schneider-electric Modicon M580 | ||
Schneider-electric Modicon M340 Firmware | ||
Schneider-electric Modicon M340 | ||
Schneider-electric Modicon Quantum Firmware | ||
Schneider-electric Modicon Quantum | ||
Schneider-electric Modicon Premium Firmware | ||
Schneider-electric Modicon Premium |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6821 is a vulnerability that is categorized as CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in certain firmware versions of Modicon M580 and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.
CVE-2019-6821 has a severity score of 6.5, which is considered medium.
The affected software for CVE-2019-6821 includes certain firmware versions of Modicon M580 (prior to V2.30) and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.
CVE-2019-6821 can be exploited by hijacking the TCP connection when using Ethernet communication in the affected firmware versions of Modicon M580 and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.
More information about CVE-2019-6821 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/108366), [ICS-CERT](https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01), [Schneider-electric](https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/)