5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.6%
Successful exploitation of this vulnerability could result in a denial-of-service condition.
The following versions of Modicon Controllers, a PLC and PAC controller for industrial control systems, are affected:
An attacker could create a denial-of-service condition by sending a specific crafted Modbus frame to the affected device.
CVE-2019-6819 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Zhang Xiaoming, Zhang Jiawei, Sun Zhonghao and Luo bing of CNCERT/CC reported this vulnerability to NCCIC.
Schneider Electric has recommended the following to mitigate this vulnerability.
Modicon M340 β The vulnerability is fixed in v3.01 and is available for download below:
Modicon M580 β The vulnerability is fixed in v2.80 and is available for download below:
Schneider Electricβs Modicon Quantum controllers have reached the end of their life and are no longer commercially available. They have been replaced by the Modicon M580 ePAC controller, Schneider Electricβs most current product. Schneider Electric recommends users migrate to the Modicon M580 ePAC.
To mitigate risks associated with this Modbus vulnerability, users should immediately set up network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.
Schneider Electric general security recommendations:
For more information, please see Schneider Electric advisory: SEVD-2019-134-05
NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability.
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6819
cwe.mitre.org/data/definitions/754.html
download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2019-134-05+-+Modicon+Controller.pdf&p_Doc_Ref=SEVD-2019-134-05
ics-cert.us-cert.gov/
ics-cert.us-cert.gov/content/recommended-practices
ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Schneider%20Electric%20Modicon%20Controllers+https://www.cisa.gov/news-events/ics-advisories/icsa-19-183-01
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-19-183-01&title=Schneider%20Electric%20Modicon%20Controllers
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-19-183-01
www.oig.dhs.gov/
www.schneider-electric.com/en/download/document/BMXP341000_Firmwares/
www.schneider-electric.com/en/download/document/BMXP342000_Firmwares/
www.schneider-electric.com/en/download/document/BMXP3420102_Firmwares/
www.schneider-electric.com/en/download/document/BMXP342020_Firmwares/
www.schneider-electric.com/en/download/document/BMXP3420302_Firmwares/
www.schneider-electric.com/en/download/document/BMXP3420302_Firmwares/
www.schneider-electric.com/en/download/document/M580_BMEH586040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP581020_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP582020_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP582040S_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP582040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP582040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP583020_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP583040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP584020_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP584040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP585040_SV2.80/
www.schneider-electric.com/en/download/document/M580_BMEP586040_SV2.80/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-19-183-01
www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Schneider%20Electric%20Modicon%20Controllers&body=www.cisa.gov/news-events/ics-advisories/icsa-19-183-01
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
50.6%