ID

VAR-201906-0219


CVE

CVE-2019-7229


TITLE

ABB HMI Missing Authentication Bypass Vulnerability

Trust: 0.8

sources: IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // CNVD: CNVD-2019-19478

DESCRIPTION

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files. ABB CP635 HMI Vulnerabilities related to certificate validation exist in the firmware and software components of.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ABBCP635HMI is a human-machine interface control panel from ABB, Switzerland. A security vulnerability exists in ABBCP635HMI due to the failure of the transport method to use any form of encryption or the reliability check of the binary of the new HMI software. An attacker could exploit the vulnerability to control the HMI or execute arbitrary code on the system. Multiple ABB Products are prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. Successful exploits will lead to other attacks. ABB CP635 HMI and CP651 HMI could allow a remote malicious user to execute arbitrary code on the system, caused by the lack of encryption for transmission methods

Trust: 2.79

sources: NVD: CVE-2019-7229 // JVNDB: JVNDB-2019-005968 // CNVD: CNVD-2019-19478 // BID: 108885 // IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // VULHUB: VHN-158664 // VULMON: CVE-2019-7229

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // CNVD: CNVD-2019-19478

AFFECTED PRODUCTS

vendor:abbmodel:cp635-bscope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:cp635-webscope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:cp630-webscope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:cp620scope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:cp630scope:ltversion:2.0.8.424

Trust: 1.0

vendor:abbmodel:cp635scope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:cp620-webscope:ltversion:2.8.0.424

Trust: 1.0

vendor:abbmodel:board support package un31scope:ltversion:2.31

Trust: 1.0

vendor:abbmodel:bsp un31scope: - version: -

Trust: 0.8

vendor:abbmodel:cp620scope: - version: -

Trust: 0.8

vendor:abbmodel:cp620-webscope: - version: -

Trust: 0.8

vendor:abbmodel:cp630scope: - version: -

Trust: 0.8

vendor:abbmodel:cp630-webscope: - version: -

Trust: 0.8

vendor:abbmodel:cp635scope: - version: -

Trust: 0.8

vendor:abbmodel:cp635-bscope: - version: -

Trust: 0.8

vendor:abbmodel:cp635-webscope: - version: -

Trust: 0.8

vendor:abbmodel:cp635 hmiscope: - version: -

Trust: 0.6

vendor:abbmodel:cp635-webscope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp635-bscope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp635scope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp630-webscope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp630scope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp620-webscope:eqversion:0

Trust: 0.3

vendor:abbmodel:cp620scope:eqversion:0

Trust: 0.3

vendor:board support package un31model: - scope:eqversion:*

Trust: 0.2

vendor:cp620model: - scope:eqversion:*

Trust: 0.2

vendor:cp620 webmodel: - scope:eqversion:*

Trust: 0.2

vendor:cp630model: - scope:eqversion:*

Trust: 0.2

vendor:cp630 webmodel: - scope:eqversion:*

Trust: 0.2

vendor:cp635model: - scope:eqversion:*

Trust: 0.2

vendor:cp635 bmodel: - scope:eqversion:*

Trust: 0.2

vendor:cp635 webmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // CNVD: CNVD-2019-19478 // BID: 108885 // JVNDB: JVNDB-2019-005968 // NVD: CVE-2019-7229

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-7229
value: HIGH

Trust: 1.0

NVD: CVE-2019-7229
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-19478
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201906-893
value: HIGH

Trust: 0.6

IVD: 0707a151-efa2-4564-b56f-95cf91c0da88
value: HIGH

Trust: 0.2

VULHUB: VHN-158664
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-7229
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-7229
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-19478
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0707a151-efa2-4564-b56f-95cf91c0da88
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-158664
severity: MEDIUM
baseScore: 5.4
vectorString: AV:A/AC:M/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-7229
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2019-7229
baseSeverity: HIGH
baseScore: 8.3
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // CNVD: CNVD-2019-19478 // VULHUB: VHN-158664 // VULMON: CVE-2019-7229 // JVNDB: JVNDB-2019-005968 // CNNVD: CNNVD-201906-893 // NVD: CVE-2019-7229

PROBLEMTYPE DATA

problemtype:CWE-494

Trust: 1.0

problemtype:CWE-295

Trust: 0.9

sources: VULHUB: VHN-158664 // JVNDB: JVNDB-2019-005968 // NVD: CVE-2019-7229

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201906-893

TYPE

trust management problem

Trust: 0.6

sources: CNNVD: CNNVD-201906-893

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005968

PATCH

title:Multiple Vulnerabilities in ABB CP635 HMIurl:https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=en&DocumentPartId=&Action=Launch

Trust: 0.8

title:Multiple Vulnerabilities in ABB CP651 HMIurl:https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=en&DocumentPartId=&Action=Launch

Trust: 0.8

title:ABBHMIMissing certification bypasses the patch for the vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/165547

Trust: 0.6

title:ABB CP635 HMI Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=94028

Trust: 0.6

sources: CNVD: CNVD-2019-19478 // JVNDB: JVNDB-2019-005968 // CNNVD: CNNVD-201906-893

EXTERNAL IDS

db:NVDid:CVE-2019-7229

Trust: 3.7

db:PACKETSTORMid:153387

Trust: 1.8

db:BIDid:108885

Trust: 1.5

db:CNNVDid:CNNVD-201906-893

Trust: 0.9

db:CNVDid:CNVD-2019-19478

Trust: 0.8

db:JVNDBid:JVNDB-2019-005968

Trust: 0.8

db:CXSECURITYid:WLB-2019060156

Trust: 0.6

db:IVDid:0707A151-EFA2-4564-B56F-95CF91C0DA88

Trust: 0.2

db:VULHUBid:VHN-158664

Trust: 0.1

db:VULMONid:CVE-2019-7229

Trust: 0.1

sources: IVD: 0707a151-efa2-4564-b56f-95cf91c0da88 // CNVD: CNVD-2019-19478 // VULHUB: VHN-158664 // VULMON: CVE-2019-7229 // BID: 108885 // JVNDB: JVNDB-2019-005968 // CNNVD: CNNVD-201906-893 // NVD: CVE-2019-7229

REFERENCES

url:http://packetstormsecurity.com/files/153387/abb-hmi-missing-signature-verification.html

Trust: 2.5

url:https://search.abb.com/library/download.aspx?documentid=3adr010376&languagecode=en&documentpartid=&action=launch

Trust: 2.0

url:http://seclists.org/fulldisclosure/2019/jun/34

Trust: 1.8

url:https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vulnerability-xl-19-005/

Trust: 1.8

url:https://search.abb.com/library/download.aspx?documentid=3adr010402&languagecode=en&documentpartid=&action=launch

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-7229

Trust: 1.4

url:http://www.abb.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-7229

Trust: 0.8

url:https://cxsecurity.com/issue/wlb-2019060156http

Trust: 0.6

url:https://www.securityfocus.com/bid/108885

Trust: 0.6

url:https://search.abb.com/library/download.aspx?documentid=3adr010376&languagecode=en&documentpartid=&action=launch

Trust: 0.1

url:https://search.abb.com/library/download.aspx?documentid=3adr010402&languagecode=en&documentpartid=&action=launch

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/295.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/162884

Trust: 0.1

sources: CNVD: CNVD-2019-19478 // VULHUB: VHN-158664 // VULMON: CVE-2019-7229 // BID: 108885 // JVNDB: JVNDB-2019-005968 // CNNVD: CNNVD-201906-893 // NVD: CVE-2019-7229

CREDITS

xen1thLabs.,xen1thLabs

Trust: 0.6

sources: CNNVD: CNNVD-201906-893

SOURCES

db:IVDid:0707a151-efa2-4564-b56f-95cf91c0da88
db:CNVDid:CNVD-2019-19478
db:VULHUBid:VHN-158664
db:VULMONid:CVE-2019-7229
db:BIDid:108885
db:JVNDBid:JVNDB-2019-005968
db:CNNVDid:CNNVD-201906-893
db:NVDid:CVE-2019-7229

LAST UPDATE DATE

2024-11-23T23:11:51.632000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-19478date:2019-06-28T00:00:00
db:VULHUBid:VHN-158664date:2019-10-09T00:00:00
db:VULMONid:CVE-2019-7229date:2019-10-09T00:00:00
db:BIDid:108885date:2019-06-05T00:00:00
db:JVNDBid:JVNDB-2019-005968date:2019-07-04T00:00:00
db:CNNVDid:CNNVD-201906-893date:2022-01-04T00:00:00
db:NVDid:CVE-2019-7229date:2024-11-21T04:47:48.030

SOURCES RELEASE DATE

db:IVDid:0707a151-efa2-4564-b56f-95cf91c0da88date:2019-06-28T00:00:00
db:CNVDid:CNVD-2019-19478date:2019-06-28T00:00:00
db:VULHUBid:VHN-158664date:2019-06-24T00:00:00
db:VULMONid:CVE-2019-7229date:2019-06-24T00:00:00
db:BIDid:108885date:2019-06-05T00:00:00
db:JVNDBid:JVNDB-2019-005968date:2019-07-04T00:00:00
db:CNNVDid:CNNVD-201906-893date:2019-06-21T00:00:00
db:NVDid:CVE-2019-7229date:2019-06-24T18:15:11.107