CVE-2019-7229

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:abb:board_support_package_un31:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:47

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-Verification.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2019/Jun/34 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2019/Jun/34 - Exploit, Mailing List, Third Party Advisory
References () https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=en&DocumentPartId=&Action=Launch - Mitigation, Patch, Vendor Advisory () https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=en&DocumentPartId=&Action=Launch - Mitigation, Patch, Vendor Advisory
References () https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=en&DocumentPartId=&Action=Launch - Mitigation, Patch, Vendor Advisory () https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=en&DocumentPartId=&Action=Launch - Mitigation, Patch, Vendor Advisory
References () https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vulnerability-xl-19-005/ - Exploit, Third Party Advisory () https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vulnerability-xl-19-005/ - Exploit, Third Party Advisory

Information

Published : 2019-06-24 18:15

Updated : 2024-11-21 04:47


NVD link : CVE-2019-7229

Mitre link : CVE-2019-7229

CVE.ORG link : CVE-2019-7229


JSON object : View

Products Affected

abb

  • cp620-web
  • cp635-b_firmware
  • cp635-b
  • cp630-web
  • cp630_firmware
  • cp635_firmware
  • cp635-web_firmware
  • cp630-web_firmware
  • cp620-web_firmware
  • cp635
  • cp620
  • board_support_package_un31
  • cp635-web
  • cp630
  • cp620_firmware
CWE
CWE-494

Download of Code Without Integrity Check