Schneider Electric has a list of recommendations to handle an improper check for unusual or exceptional conditions vulnerability in its Magelis HMI Panel, according to a report with CISA.

Successful exploitation of this remotely exploitable vulnerability, discovered by the VAPT Team, C3i Center, IIT Kanpur, India, could allow a denial-of-service condition.

The following versions of the Magelis HMI Panels suffer from the issue:

  • Magelis HMIGTO series, all firmware versions
  • Magelis HMISTO series, all firmware versions
  • Magelis XBTGH series, all firmware versions
  • Magelis HMIGTU series, all firmware versions
  • Magelis HMIGTUX series, all firmware versions
  • Magelis HMISCU series, all firmware versions
  • Magelis HMISTU series, all firmware versions
  • Magelis XBTGT series, all firmware versions
  • Magelis XBTGC series, all firmware versions
  • Magelis HMIGXO series, all firmware versions
  • Magelis HMIGXU series, all firmware versions
  • In the vulnerability, when the device receives a high rate of frames, the HMI may temporarily freeze. When the attack stops, the buffered commands are processed by the HMI.

    Schneider Bold

    CVE-2019-6833 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.4.

    The product sees use mainly in the critical manufacturing and food and agriculture sectors. It also sees action on a global basis.

    No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

    Schneider Electric recommends users set up network segmentation and implement a firewall to block all unauthorized access to Ports 44818/TCP, 502/TCP, 6000/TCP, 6002/TCP, 8080/TCP, 8014/TCP, and 6001/TCP.

    For more information, see the Schneider Electric security notification.

    Pin It on Pinterest

    Share This