Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2019-6527 CVE-2019-6533 CVE-2019-6529 |
CWE-ID | CWE-287 CWE-306 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
PR100088 Modbus gateway Hardware solutions / Firmware |
Vendor | Kunbus |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU17390
Risk: Low
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-6527
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to improper authentication. A remote attacker can bypass authentication and change the password for an admin user who is currently or previously logged in, provided the device has not been restarted.
MitigationUpdate to version R02.
Vulnerable software versionsPR100088 Modbus gateway: All versions
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-19-036-05
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17391
Risk: Low
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-6533
CWE-ID:
CWE-306 - Missing Authentication for Critical Function
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to missing authentication for critical function. A remote attacker can read and write registers used to store Modbus values from the web interface without authentication.
MitigationUpdate to version R02.
Vulnerable software versionsPR100088 Modbus gateway: All versions
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-19-036-05
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17392
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-6529
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote high-privileged attacker to cause DoS condition.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can supply a specially crafted FTP request and crash the device.
MitigationUpdate to version R02.
Vulnerable software versionsPR100088 Modbus gateway: All versions
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-19-036-05
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.