Sploit.io - Search

Product: U.motion Server, version: MEG6260-0410 - U.motion KNX Server Plus

CVE-2019-6835

Severity: Unknown

Description: A Cross-Site Scripting (XSS) CWE-79 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to inject client-side script when a user visits a web page.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.002870000
  • Percentile: 0.517440000
  • Date: 2026-02-11

ExploitDB

No data available.

HackerOne Data

  • Rank: 8687
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Schneider Electric SE U.motion Server - Versions: MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2019-6835, is a Cross-Site Scripting (XSS) flaw present in several versions of the Schneider Electric U.motion Server. This is a common web application vulnerability where an attacker can inject malicious client-side scripts into web pages viewed by users. The business impact of this XSS vulnerability can range from minor defacement to full account compromise, depending on the context of the web page and user privileges. Likelihood of exploitation is moderate, as it requires a user to visit a web page controlled by the U.motion Server and susceptible to the injected script. Ease of exploitation is also moderate, requiring the attacker to craft a malicious script and deliver it through a vulnerable input field or URL parameter. The primary impact is to confidentiality as an attacker could steal cookies, session tokens, or other sensitive information. Integrity could also be impacted if the attacker can modify web page content or user inputs. Availability is potentially impacted if the injected script causes a denial-of-service condition, though this is less likely. The EPSS score of 0.002870000 suggests a relatively low, but non-negligible risk.

    2. Potential Attack Scenarios
    An attacker could leverage this XSS vulnerability in the following scenario: A user logs into the U.motion Server web interface. The attacker crafts a malicious URL containing an XSS payload and sends it to the user via phishing email or a social engineering tactic. When the user clicks the link, the malicious script is executed within the context of the U.motion Server web application. This script could steal the user’s session cookie, allowing the attacker to impersonate the user and gain access to the U.motion Server with their privileges. The attacker could then modify KNX system settings, monitor building automation data, or even disrupt control operations, depending on the user’s role and the configuration of the KNX system. The attack vector is a crafted URL, the process involves user interaction (clicking the link), and the outcome is potential account compromise and control of the KNX system.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade the affected U.motion Server versions (MEG6501-0001, MEG6501-0002, MEG6260-0410, Touch 10, MEG6260-0415, Touch 15) to the latest patched version. Schneider Electric provides a security advisory with detailed patching instructions: https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01. As an immediate short-term mitigation, input validation and output encoding should be implemented on all user-supplied data to sanitize potentially malicious script. Web application firewalls (WAFs) can be deployed in front of the U.motion Server to filter out XSS payloads. Regularly monitor web traffic for suspicious activity and XSS attempts. Enforce strong password policies and multi-factor authentication for user accounts to limit the impact of a successful XSS attack.

    4. Executive Summary
    The Schneider Electric U.motion Server is vulnerable to a Cross-Site Scripting (XSS) attack, allowing an attacker to inject malicious scripts into web pages viewed by users. This could lead to stolen credentials, modified system settings, and potential disruption of building automation control. The risk is moderate, but the potential business impact can be significant, especially for organizations relying heavily on the KNX system controlled by the U.motion Server. It is critical to upgrade to the latest patched version of the U.motion Server as soon as possible. Implementing input validation, output encoding, and deploying a Web Application Firewall will provide additional layers of defense. Prioritizing this vulnerability will help ensure the confidentiality, integrity, and availability of your building automation system.

    CVE-2019-6837

    Severity: Unknown

    Description: A Server-Side Request Forgery (SSRF): CWE-918 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could cause server configuration data to be exposed when an attacker modifies a URL.

    CVSS Score: N/A

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.002530000
    • Percentile: 0.483030000
    • Date: 2026-02-11

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 8688
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • CVE-2019-6837 U.motion Server - Versions: MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, CVE-2019-6837, is a Server-Side Request Forgery (SSRF) affecting multiple versions of the U.motion Server. SSRF vulnerabilities allow an attacker to make the server initiate connections to arbitrary internal or external resources. In this case, the attacker can modify a URL to expose server configuration data. The risk is moderate. The likelihood of exploitation is considered moderate, as it requires an attacker to be able to manipulate a URL within the server's request flow. The ease of exploitation is also moderate, dependent on the specific URL parameter and the server's validation mechanisms. The primary impact is on confidentiality, as server configuration data can be exposed. Integrity could be impacted if the SSRF allows modification of internal resources. Availability is less directly impacted, but could be affected if the SSRF causes excessive resource consumption. The EPSS score of 0.002530000 suggests a relatively low but non-negligible risk, indicating that exploitation has occurred or is likely to occur.

      2. Potential Attack Scenarios
      An attacker could leverage this SSRF vulnerability to retrieve sensitive configuration information from the U.motion server. The attack vector begins with identifying a URL parameter that the server uses in a subsequent request. The attacker crafts a URL containing a malicious internal or external address. For example, the attacker could modify a URL parameter to point to an internal metadata service (like AWS metadata) or to a file share accessible from the server. The server, when processing the modified URL, will then make a request to the attacker-specified address, returning the data in its response. The potential outcome is exposure of server credentials, internal network information, or other sensitive configuration data, potentially leading to further compromise of the system or network.

      3. Mitigation Recommendations
      The primary mitigation for this vulnerability is to apply the patch provided by Schneider Electric. Refer to SEVD-2019-253-01 (https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01) for detailed instructions on patching the affected U.motion Server versions (MEG6501-0001, MEG6501-0002, MEG6260-0410, Touch 10, MEG6260-0415, Touch 15). As an immediate action, if patching cannot be done immediately, implement strict URL validation. Ensure that any URLs used by the server are properly validated and sanitized to prevent arbitrary addresses. Consider implementing a whitelist of allowed domains or IP addresses that the server can request. Monitor network traffic for unusual outbound connections originating from the U.motion server.

      4. Executive Summary
      CVE-2019-6837 is a Server-Side Request Forgery vulnerability in Schneider Electric's U.motion Server. This vulnerability allows an attacker to potentially expose sensitive server configuration data by manipulating a URL. While the risk is moderate, the exposure of configuration data could lead to further compromise of the system and potentially the wider network. We recommend patching the affected U.motion Server versions as soon as possible, following the guidance in SEVD-2019-253-01. Prompt action is important to minimize the risk of data exposure and maintain the security of your U.motion Server infrastructure. Addressing this vulnerability will improve the overall confidentiality of your system and reduce the potential impact of a successful attack.

      CVE-2019-6840

      Severity: Unknown

      Description: A Format String: CWE-134 vulnerability exists in U.motion Server (MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15), which could allow an attacker to send a crafted message to the target server, thereby causing arbitrary commands to be executed.

      CVSS Score: N/A

      Priority

      D

      CISA Data

      EPSS Data

      • EPSS: 0.005040000
      • Percentile: 0.655780000
      • Date: 2026-02-11

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 8685
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Schneider Electric SE U.motion Server - Versions: MEG6501-0001 - U.motion KNX server, MEG6501-0002 - U.motion KNX Server Plus, MEG6260-0410 - U.motion KNX Server Plus, Touch 10, MEG6260-0415 - U.motion KNX Server Plus, Touch 15

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability, CVE-2019-6840, is a Format String vulnerability within the Schneider Electric U.motion Server software. This means that improperly formatted input can allow an attacker to execute arbitrary commands on the server. The business impact can be significant, particularly in industrial control systems where U.motion servers are commonly used. The likelihood of exploitation is moderate, as it requires sending a crafted message, but the ease of exploitation depends on network accessibility and authentication requirements. A successful exploit could impact confidentiality, integrity, and availability. Confidentiality could be breached if sensitive data is read from the server. Integrity is impacted by the ability to execute arbitrary commands, potentially altering system configurations or processes. Availability could be compromised if the attacker causes a denial of service or crashes the server. The EPSS score of 0.005040000 suggests a relatively low, but present, exploitable risk.

        2. Potential Attack Scenarios
        An attacker could leverage this vulnerability by sending a specially crafted message to the U.motion server. Imagine a scenario where the U.motion server logs data received from KNX devices. An attacker, gaining access to the network segment, crafts a message containing format string specifiers (e.g., %s, %x, %n) within a data field. When the server processes this message and logs it, the format string specifiers are interpreted, potentially allowing the attacker to read from or write to memory locations. With sufficient control, the attacker could use this to overwrite function pointers and ultimately execute arbitrary code on the server, potentially taking complete control. The attack vector is network-based, requiring network connectivity to the U.motion server. The attack process involves crafting the message, sending it to the server, and observing the results to refine the exploit. The potential outcome is full system compromise, allowing the attacker to control the U.motion server and potentially the connected KNX devices.

        3. Mitigation Recommendations
        The primary mitigation is to apply the latest patch provided by Schneider Electric. Refer to SEVD-2019-253-01 (https://www.schneider-electric.com/ww/en/download/document/SEVD-2019-253-01) for details on the patch and installation instructions for the affected U.motion Server versions (MEG6501-0001, MEG6501-0002, MEG6260-0410, Touch 10, MEG6260-0415, Touch 15). As an immediate action, consider segmenting the network where the U.motion servers reside to limit the blast radius of a potential compromise. Implement strong authentication and access control policies for the U.motion server to restrict who can send messages to it. Monitor network traffic for unusual patterns that might indicate exploitation attempts, specifically looking for messages containing format string specifiers. Regularly review server logs for anomalies that may indicate successful exploitation.

        4. Executive Summary
        Schneider Electric U.motion Server software is vulnerable to a Format String vulnerability (CVE-2019-6840). This vulnerability could allow an attacker to execute arbitrary commands on the server, potentially impacting the confidentiality, integrity, and availability of the system and connected devices. While the risk is currently assessed as moderate, a successful exploit could significantly disrupt operations, especially in industrial environments. It is crucial to apply the patch provided by Schneider Electric (SEVD-2019-253-01) as soon as possible. Network segmentation and strong access control measures should also be implemented to minimize the risk. Addressing this vulnerability promptly will help protect critical systems and ensure continued operational stability.