First published: Tue Sep 17 2019(Updated: )
A CWE-248: Uncaught Exception vulnerability exists Modicon M580 (firmware version prior to V2.90), Modicon M340 (firmware version prior to V3.10), Modicon Premium (all versions), and Modicon Quantum (all versions), which could cause a possible denial of service when reading specific coils and registers in the controller over Modbus.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric Modicon M580 Firmware | <2.90 | |
Schneider Electric Modicon M580 | ||
Schneider Electric Modicon M340 Firmware | <3.10 | |
Schneider Electric Modicon M340 | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Premium | ||
Schneider Electric Modicon Quantum Firmware | ||
Schneider Electric Modicon Quantum |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-6828 is high (7.5).
Modicon M580 (firmware version prior to V2.90), Modicon M340 (firmware version prior to V3.10), Modicon Premium (all versions), and Modicon Quantum (all versions) are affected by CVE-2019-6828.
CVE-2019-6828 is a CWE-248: Uncaught Exception vulnerability that could cause a possible denial of service when reading specific coils and registers.
To fix CVE-2019-6828, update the firmware of Modicon M580 to version V2.90 or higher, and Modicon M340 to version V3.10 or higher.
More information about CVE-2019-6828 can be found at the following link: [CVE-2019-6828](https://www.schneider-electric.com/en/download/document/SEVD-2019-134-11/).