mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
72 lines
2.6 KiB
JSON
72 lines
2.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2019-6821",
|
|
"ASSIGNER": "cybersecurity@schneider-electric.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-330: Use of Insufficiently Random Values"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01",
|
|
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-136-01"
|
|
},
|
|
{
|
|
"refsource": "BID",
|
|
"name": "108366",
|
|
"url": "http://www.securityfocus.com/bid/108366"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/",
|
|
"url": "https://www.schneider-electric.com/en/download/document/SEVD-2019-134-03/"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum."
|
|
}
|
|
]
|
|
}
|
|
} |