// For flags

CVE-2019-6840

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Format String: CWE-134 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to send a crafted message to the target server, thereby causing arbitrary commands to be executed.

Una Cadena de Formato: Se presenta una vulnerabilidad CWE-134 en U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), lo que podría permitir a un atacante enviar un mensaje diseñado hacia servidor de destino, causando de este modo comandos arbitrarios a ser ejecutados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-25 CVE Reserved
  • 2019-09-17 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-134: Use of Externally-Controlled Format String
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Schneider-electric
Search vendor "Schneider-electric"
Meg6501-0001 Firmware
Search vendor "Schneider-electric" for product "Meg6501-0001 Firmware"
< 1.3.7
Search vendor "Schneider-electric" for product "Meg6501-0001 Firmware" and version " < 1.3.7"
-
Affected
in Schneider-electric
Search vendor "Schneider-electric"
Meg6501-0001
Search vendor "Schneider-electric" for product "Meg6501-0001"
--
Safe
Schneider-electric
Search vendor "Schneider-electric"
Meg6501-0002 Firmware
Search vendor "Schneider-electric" for product "Meg6501-0002 Firmware"
< 1.3.7
Search vendor "Schneider-electric" for product "Meg6501-0002 Firmware" and version " < 1.3.7"
-
Affected
in Schneider-electric
Search vendor "Schneider-electric"
Meg6501-0002
Search vendor "Schneider-electric" for product "Meg6501-0002"
--
Safe
Schneider-electric
Search vendor "Schneider-electric"
Meg6260-0410 Firmware
Search vendor "Schneider-electric" for product "Meg6260-0410 Firmware"
< 1.3.7
Search vendor "Schneider-electric" for product "Meg6260-0410 Firmware" and version " < 1.3.7"
-
Affected
in Schneider-electric
Search vendor "Schneider-electric"
Meg6260-0410
Search vendor "Schneider-electric" for product "Meg6260-0410"
--
Safe
Schneider-electric
Search vendor "Schneider-electric"
Meg6260-0415 Firmware
Search vendor "Schneider-electric" for product "Meg6260-0415 Firmware"
< 1.3.7
Search vendor "Schneider-electric" for product "Meg6260-0415 Firmware" and version " < 1.3.7"
-
Affected
in Schneider-electric
Search vendor "Schneider-electric"
Meg6260-0415
Search vendor "Schneider-electric" for product "Meg6260-0415"
--
Safe