Vulnerability Description
The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Abb | Board Support Package Un31 | < 2.31 |
| Abb | Cp620 Firmware | < 2.8.0.424 |
| Abb | Cp620 | - |
| Abb | Cp620-Web Firmware | < 2.8.0.424 |
| Abb | Cp620-Web | - |
| Abb | Cp630 Firmware | < 2.0.8.424 |
| Abb | Cp630 | - |
| Abb | Cp630-Web Firmware | < 2.8.0.424 |
| Abb | Cp630-Web | - |
| Abb | Cp635 Firmware | < 2.8.0.424 |
| Abb | Cp635 | - |
| Abb | Cp635-B Firmware | < 2.8.0.424 |
| Abb | Cp635-B | - |
| Abb | Cp635-Web Firmware | < 2.8.0.424 |
| Abb | Cp635-Web | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-VerificatiExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/34ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2019/Jun/34ExploitMailing ListThird Party Advisory
- https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=MitigationPatchVendor Advisory
- https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=MitigationPatchVendor Advisory
- https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vExploitThird Party Advisory
- http://packetstormsecurity.com/files/153387/ABB-HMI-Missing-Signature-VerificatiExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/34ExploitMailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2019/Jun/34ExploitMailing ListThird Party Advisory
- https://search.abb.com/library/Download.aspx?DocumentID=3ADR010376&LanguageCode=MitigationPatchVendor Advisory
- https://search.abb.com/library/Download.aspx?DocumentID=3ADR010402&LanguageCode=MitigationPatchVendor Advisory
- https://www.darkmatter.ae/xen1thlabs/abb-hmi-absence-of-signature-verification-vExploitThird Party Advisory
FAQ
What is CVE-2019-7229?
CVE-2019-7229 is a vulnerability with a CVSS score of 8.3 (HIGH). The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB...
How severe is CVE-2019-7229?
CVE-2019-7229 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7229?
Check the references section above for vendor advisories and patch information. Affected products include: Abb Board Support Package Un31, Abb Cp620 Firmware, Abb Cp620, Abb Cp620-Web Firmware, Abb Cp620-Web.