Lucene search

K
cve[email protected]CVE-2019-13927
HistoryDec 12, 2019 - 2:15 p.m.

CVE-2019-13927

2019-12-1214:15:14
CWE-472
CWE-668
web.nvd.nist.gov
81
desigo px
automation controllers
vulnerability
denial of service
web server
security
firmware
http
nvd
cve-2019-13927

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.3%

A vulnerability has been identified in Desigo PX automation controllers PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D with Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2 (All firmware versions < V6.00.320), Desigo PX automation controllers PXC00-U, PXC64-U, PXC128-U with Desigo PX Web modules PXA30-W0, PXA30-W1, PXA30-W2 (All firmware versions < V6.00.320), Desigo PX automation controllers PXC22.1-E.D, PXC36-E.D, PXC36.1-E.D with activated web server (All firmware versions < V6.00.320). The device contains a vulnerability that could allow an attacker to cause a denial of service condition on the device’s web server by sending a specially crafted HTTP message to the web server port (tcp/80). The security vulnerability could be exploited by an attacker with network access to an affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the device’s web service. While the device itself stays operational, the web server responds with HTTP status code 404 (Not found) to any further request. A reboot is required to recover the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known.

Affected configurations

NVD
Node
siemenspxc00-e.dMatch-
AND
siemenspxc00-e.d_firmwareRange<6.00.320
Node
siemenspxc50-e.dMatch-
AND
siemenspxc50-e.d_firmwareRange<6.00.320
Node
siemenspxc100-e.dMatch-
AND
siemenspxc100-e.d_firmwareRange<6.00.320
Node
siemenspxc200-e.dMatch-
AND
siemenspxc200-e.d_firmwareRange<6.00.320
Node
siemenspxa40-w0Match-
AND
siemenspxa40-w0_firmwareRange<6.00.320
Node
siemenspxa40-w1Match-
AND
siemenspxa40-w1_firmwareRange<6.00.320
Node
siemenspxa40-w2Match-
AND
siemenspxa40-w2_firmwareRange<6.00.320
Node
siemenspxc00-uMatch-
AND
siemenspxc00-u_firmwareRange<6.00.320
Node
siemenspxc64-u_firmwareRange<6.00.320
AND
siemenspxc64-uMatch-
Node
siemenspxc128-u_firmwareRange<6.00.320
AND
siemenspxc128-uMatch-
Node
siemenspxa30-w0_firmwareRange<6.00.320
AND
siemenspxa30-w0Match-
Node
siemenspxa30-w1_firmwareRange<6.00.320
AND
siemenspxa30-w1Match-
Node
siemenspxa30-w2_firmwareRange<6.00.320
AND
siemenspxa30-w2Match-
Node
siemenspxc22.1-e.d_firmwareRange<6.00.320
AND
siemenspxc22.1-e.dMatch-
Node
siemenspxc36-e.d_firmwareRange<6.00.320
AND
siemenspxc36-e.dMatch-
Node
siemenspxc36.1-e.d_firmwareRange<6.00.320
AND
siemenspxc36.1-e.dMatch-

CNA Affected

[
  {
    "product": "Desigo PX automation controllers PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D with Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All firmware versions < V6.00.320"
      }
    ]
  },
  {
    "product": "Desigo PX automation controllers PXC00-U, PXC64-U, PXC128-U with Desigo PX Web modules PXA30-W0, PXA30-W1, PXA30-W2",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All firmware versions < V6.00.320"
      }
    ]
  },
  {
    "product": "Desigo PX automation controllers PXC22.1-E.D, PXC36-E.D, PXC36.1-E.D with activated web server",
    "vendor": "Siemens AG",
    "versions": [
      {
        "status": "affected",
        "version": "All firmware versions < V6.00.320"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.3%