First published: Mon Jun 24 2019(Updated: )
The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ABB Board Support Package Un31 | <2.31 | |
Abb CP620-Web Firmware | <2.8.0.424 | |
ABB Relion 620 | ||
ABB CP620 Firmware | <2.8.0.424 | |
Abb Cp620-web Firmware | ||
ABB CP630-web | <2.0.8.424 | |
Abb Cp630 Firmware | ||
ABB CP630-web | <2.8.0.424 | |
Abb Cp630 Firmware | ||
ABB CP635 Firmware | <2.8.0.424 | |
ABB CP635 Firmware | ||
ABB CP635 | <2.8.0.424 | |
ABB CP635 | ||
ABB CP635-web | <2.8.0.424 | |
ABB CP635-web Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7229 has been assigned a severity score, indicating a potential security risk due to inadequate encryption in firmware updates.
To fix CVE-2019-7229, ensure firmware updates are signed and implement encryption during the update process.
CVE-2019-7229 affects various ABB CP635 firmware versions, including CP620, CP630, and their web counterparts.
The risks of CVE-2019-7229 include potential unauthorized firmware modifications and compromised system integrity.
A workaround for CVE-2019-7229 is to limit firmware update access and monitor for unauthorized changes.