Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-7229


The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.


Published

2019-06-24T18:15:11.107

Last Modified

2024-11-21T04:47:48.030

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.3 (HIGH)

CVSSv2 Vector

AV:A/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

5.5

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-494

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application abb board_support_package_un31 < 2.31 Yes
Operating System abb cp620_firmware < 2.8.0.424 Yes
Hardware abb cp620 - No
Operating System abb cp620-web_firmware < 2.8.0.424 Yes
Hardware abb cp620-web - No
Operating System abb cp630_firmware < 2.0.8.424 Yes
Hardware abb cp630 - No
Operating System abb cp630-web_firmware < 2.8.0.424 Yes
Hardware abb cp630-web - No
Operating System abb cp635_firmware < 2.8.0.424 Yes
Hardware abb cp635 - No
Operating System abb cp635-b_firmware < 2.8.0.424 Yes
Hardware abb cp635-b - No
Operating System abb cp635-web_firmware < 2.8.0.424 Yes
Hardware abb cp635-web - No

References