CVE-2019-10953
Summary
| CVE | CVE-2019-10953 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-17 15:29:00 UTC |
| Updated | 2022-01-31 20:48:00 UTC |
| Description | ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. |
Risk And Classification
Problem Types: CWE-770
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Abb | Pm554-tp-eth | - | All | All | All |
| Hardware | Abb | Pm554-tp-eth | - | All | All | All |
| Operating System | Abb | Pm554-tp-eth Firmware | - | All | All | All |
| Operating System | Abb | Pm554-tp-eth Firmware | - | All | All | All |
| Hardware | Phoenixcontact | Ilc 151 Eth | - | All | All | All |
| Hardware | Phoenixcontact | Ilc 151 Eth | - | All | All | All |
| Operating System | Phoenixcontact | Ilc 151 Eth Firmware | - | All | All | All |
| Operating System | Phoenixcontact | Ilc 151 Eth Firmware | - | All | All | All |
| Hardware | Schneider-electric | Modicon M221 | - | All | All | All |
| Hardware | Schneider-electric | Modicon M221 | - | All | All | All |
| Operating System | Schneider-electric | Modicon M221 Firmware | All | All | All | All |
| Operating System | Schneider-electric | Modicon M221 Firmware | All | All | All | All |
| Hardware | Se | Modicon M221 | - | All | All | All |
| Operating System | Se | Modicon M221 Firmware | All | All | All | All |
| Hardware | Siemens | 6ed1052-1cc01-0ba8 | - | All | All | All |
| Hardware | Siemens | 6ed1052-1cc01-0ba8 | - | All | All | All |
| Operating System | Siemens | 6ed1052-1cc01-0ba8 Firmware | - | All | All | All |
| Operating System | Siemens | 6ed1052-1cc01-0ba8 Firmware | - | All | All | All |
| Hardware | Siemens | 6es7211-1ae40-0xb0 | - | All | All | All |
| Hardware | Siemens | 6es7211-1ae40-0xb0 | - | All | All | All |
| Operating System | Siemens | 6es7211-1ae40-0xb0 Firmware | - | All | All | All |
| Operating System | Siemens | 6es7211-1ae40-0xb0 Firmware | - | All | All | All |
| Hardware | Siemens | 6es7314-6eh04-0ab0 | - | All | All | All |
| Hardware | Siemens | 6es7314-6eh04-0ab0 | - | All | All | All |
| Operating System | Siemens | 6es7314-6eh04-0ab0 Firmware | - | All | All | All |
| Operating System | Siemens | 6es7314-6eh04-0ab0 Firmware | - | All | All | All |
| Hardware | Wago | Bacnet/ip | - | All | All | All |
| Operating System | Wago | Bacnet/ip Firmware | - | All | All | All |
| Hardware | Wago | Bacnet/ip | - | All | All | All |
| Hardware | Wago | Bacnet/ip | - | All | All | All |
| Operating System | Wago | Bacnet/ip Firmware | - | All | All | All |
| Operating System | Wago | Bacnet/ip Firmware | - | All | All | All |
| Hardware | Wago | Ethernet | - | All | All | All |
| Hardware | Wago | Ethernet | - | All | All | All |
| Operating System | Wago | Ethernet Firmware | - | All | All | All |
| Operating System | Wago | Ethernet Firmware | - | All | All | All |
| Hardware | Wago | Knx Ip | - | All | All | All |
| Hardware | Wago | Knx Ip | - | All | All | All |
| Operating System | Wago | Knx Ip Firmware | - | All | All | All |
| Operating System | Wago | Knx Ip Firmware | - | All | All | All |
| Hardware | Wago | Pfc100 | - | All | All | All |
| Hardware | Wago | Pfc100 | - | All | All | All |
| Operating System | Wago | Pfc100 Firmware | - | All | All | All |
| Operating System | Wago | Pfc100 Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Malformed Request | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| PLC Cycle Time Influences | ICS-CERT | MISC | ics-cert.us-cert.gov | Mitigation, Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.