Schneider Electric has a list of recommendations to handle an improper check for unusual or exceptional conditions vulnerability in its Magelis HMI Panel, according to a report with CISA.
Successful exploitation of this remotely exploitable vulnerability, discovered by the VAPT Team, C3i Center, IIT Kanpur, India, could allow a denial-of-service condition.
The following versions of the Magelis HMI Panels suffer from the issue:
In the vulnerability, when the device receives a high rate of frames, the HMI may temporarily freeze. When the attack stops, the buffered commands are processed by the HMI.
CVE-2019-6833 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.4.
The product sees use mainly in the critical manufacturing and food and agriculture sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Schneider Electric recommends users set up network segmentation and implement a firewall to block all unauthorized access to Ports 44818/TCP, 502/TCP, 6000/TCP, 6002/TCP, 8080/TCP, 8014/TCP, and 6001/TCP.
For more information, see the Schneider Electric security notification.