Vulnerabilites related to Omron - CX-One
var-202203-1535
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1535", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-577" } ], "trust": 0.7 }, "cve": "CVE-2022-25959", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-25959", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418113", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-25959", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001556", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-25959", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-25959", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-25959", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-25959", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-25959", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2484", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418113", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-25959" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-25959", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-577", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001556", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14677", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2484", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418113", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "id": "VAR-202203-1535", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418113" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:52.206000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-577/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25959" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-25959/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-577" }, { "db": "VULHUB", "id": "VHN-418113" }, { "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-577" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418113" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "date": "2022-04-01T23:15:14.470000", "db": "NVD", "id": "CVE-2022-25959" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-577" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418113" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001556" }, { "date": "2023-06-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2484" }, { "date": "2024-11-21T06:53:15.767000", "db": "NVD", "id": "CVE-2022-25959" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2484" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Buffer Error Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001556" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2484" } ], "trust": 0.6 } }
var-201812-0479
Vulnerability from variot
Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 1.4, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.23" }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.24" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010184" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" } ], "trust": 1.4 }, "cve": "CVE-2018-18993", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-18993", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-25281", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "7d808751-463f-11e9-abf0-000c29342cb1", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-129608", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-010184", "trust": 1.6, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2018-18993", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2018-18993", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-25281", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201812-128", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129608", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-18993", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "description": { "_id": null, "data": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2", "sources": [ { "db": "NVD", "id": "CVE-2018-18993" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "BID", "id": "106106" }, { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" } ], "trust": 4.05 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-18993", "trust": 5.1 }, { "db": "ICS CERT", "id": "ICSA-18-338-01", "trust": 3.5 }, { "db": "BID", "id": "106106", "trust": 2.7 }, { "db": "CNNVD", "id": "CNNVD-201812-128", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-25281", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90473043", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6610", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1368", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6603", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1366", "trust": 0.7 }, { "db": "IVD", "id": "7D808751-463F-11E9-ABF0-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-129608", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-18993", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "id": "VAR-201812-0479", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" } ], "trust": 1.449529875 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" } ] }, "last_update_date": "2024-11-23T22:45:08.278000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Omron CX-One Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/146977" }, { "title": "Omron CX-One Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87424" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129608" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "references": { "_id": null, "data": [ { "trust": 5.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/106106" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90473043/" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "db": "BID", "id": "106106", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-12-14T00:00:00", "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "date": "2018-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "date": "2018-12-04T22:29:00.340000", "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "date": "2020-09-18T00:00:00", "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2020-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "date": "2024-11-21T03:57:00.207000", "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "BID", "id": "106106" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ], "trust": 0.9 }, "title": { "_id": null, "data": "Omron CX-One Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ], "trust": 0.8 } }
var-201804-1654
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 3.5, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" } ], "trust": 3.5 }, "cve": "CVE-2018-7514", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 3.5, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07872", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137546", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7514", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-7514", "trust": 3.5, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7514", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-07872", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7514" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 5.85 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7514", "trust": 7.1 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07872", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5440", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-287", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5402", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-281", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5405", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-284", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5403", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-282", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5406", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-285", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137546", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "id": "VAR-201804-1654", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" } ] }, "last_update_date": "2024-11-23T22:17:35.032000Z", "patch": { "_id": null, "data": [ { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126151" }, { "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-122", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "references": { "_id": null, "data": [ { "trust": 6.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2018-04-17T19:29:00.340000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2020-10-02T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2024-11-21T04:12:16.637000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.6 }, "title": { "_id": null, "data": "OMRON CX-One Multiple vulnerabilities in applications included", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.8 } }
var-202211-1695
Vulnerability from variot
Out-of-bounds write vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. Provided by Omron Corporation CX-Programmer contains multiple vulnerabilities: * Use of freed memory ( Use-after-free )( CWE-416 ) - CVE-2022-43508 , CVE-2023-22277 , CVE-2023-22317 , CVE-2023-22314 It was * out-of-bounds write ( CWE-787 ) - CVE-2022-43509 It was * stack-based buffer overflow ( CWE-121 ) - CVE-2022-43667 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1695", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.77" }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "ver.9.77 and earlier - cve-2022-43508" }, { "model": "cx-programmer", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "ver.9.79 and earlier - cve-2023-22277 , cve-2023-22317 , cve-2023-22314" }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "ver.9.78 and earlier - cve-2022-43509 , cve-2022-43667" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-23-634" } ], "trust": 0.7 }, "cve": "CVE-2022-43509", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-43509", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-002765", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-43509", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-43509", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-002765", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-43509", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202211-3542", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. Provided by Omron Corporation CX-Programmer contains multiple vulnerabilities: * Use of freed memory ( Use-after-free )( CWE-416 ) - CVE-2022-43508 , CVE-2023-22277 , CVE-2023-22317 , CVE-2023-22314 It was * out-of-bounds write ( CWE-787 ) - CVE-2022-43509 It was * stack-based buffer overflow ( CWE-121 ) - CVE-2022-43667 This vulnerability information is JPCERT/CC Report to JPCERT/CC Coordinated with the developer. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-43509" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "VULHUB", "id": "VHN-440561" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-43509", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU92877622", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-356-04", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002765", "trust": 1.4 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15484", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-634", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.6664", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202211-3542", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-440561", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "VULHUB", "id": "VHN-440561" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "id": "VAR-202211-1695", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-440561" } ], "trust": 0.63087795 }, "last_update_date": "2024-08-14T14:37:10.088000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Information from Omron Corporation", "trust": 0.8, "url": "https://jvn.jp/vu/JVNVU92877622/995504/index.html" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-04" }, { "title": "Omron CX-Programmer Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=216966" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "CNNVD", "id": "CNNVD-202211-3542" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [ others ]", "trust": 0.8 }, { "problemtype": " Use of freed memory (CWE-416) [ others ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-440561" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu92877622/index.html" }, { "trust": 1.7, "url": "https://jvn.jp/en/vu/jvnvu92877622/index.html" }, { "trust": 1.5, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-356-04" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43508" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43509" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43667" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-22277" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-22314" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-22317" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-356-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-43509/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6664" }, { "trust": 0.6, "url": "https://jvndb.jvn.jp/en/contents/2022/jvndb-2022-002765.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "VULHUB", "id": "VHN-440561" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-23-634" }, { "db": "VULHUB", "id": "VHN-440561" }, { "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "db": "NVD", "id": "CVE-2022-43509" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-17T00:00:00", "db": "ZDI", "id": "ZDI-23-634" }, { "date": "2022-12-07T00:00:00", "db": "VULHUB", "id": "VHN-440561" }, { "date": "2022-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "date": "2022-11-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "date": "2022-12-07T04:15:10.850000", "db": "NVD", "id": "CVE-2022-43509" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-17T00:00:00", "db": "ZDI", "id": "ZDI-23-634" }, { "date": "2022-12-09T00:00:00", "db": "VULHUB", "id": "VHN-440561" }, { "date": "2024-04-05T09:14:00", "db": "JVNDB", "id": "JVNDB-2022-002765" }, { "date": "2022-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202211-3542" }, { "date": "2022-12-09T01:27:25.850000", "db": "NVD", "id": "CVE-2022-43509" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-3542" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Omron \u00a0CX-Programmer\u00a0 Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002765" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202211-3542" } ], "trust": 0.6 } }
var-201901-0858
Vulnerability from variot
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 2.8, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.0" }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.50" }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 4.50" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 2.0" }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.50" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=2.0" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "2.0" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "4.50" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "2.0.1" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "BID", "id": "106524" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "NVD", "id": "CVE-2018-19027" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-one", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-001004" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "BID", "id": "106524" }, { "db": "CNNVD", "id": "CNNVD-201901-432" } ], "trust": 3.7 }, "cve": "CVE-2018-19027", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-19027", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 5.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-001004", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2019-01682", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "7d84a600-463f-11e9-9ea8-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-129645", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-19027", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.8, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-19027", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2019-001004", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-19027", "trust": 2.8, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2018-19027", "trust": 1.0, "value": "HIGH" }, { "author": "JPCERT/CC", "id": "JVNDB-2019-001004", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-01682", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201901-432", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129645", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "VULHUB", "id": "VHN-129645" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "CNNVD", "id": "CNNVD-201901-432" }, { "db": "NVD", "id": "CVE-2018-19027" } ] }, "description": { "_id": null, "data": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions", "sources": [ { "db": "NVD", "id": "CVE-2018-19027" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "BID", "id": "106524" }, { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-129645" } ], "trust": 5.22 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-19027", "trust": 6.4 }, { "db": "ICS CERT", "id": "ICSA-19-010-02", "trust": 2.8 }, { "db": "BID", "id": "106524", "trust": 2.6 }, { "db": "CNNVD", "id": "CNNVD-201901-432", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2019-01682", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU97716739", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6587", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-120", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6585", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-019", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6565", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-017", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6566", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-19-018", "trust": 0.7 }, { "db": "IVD", "id": "7D84A600-463F-11E9-9EA8-000C29342CB1", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-98818", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-129645", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "VULHUB", "id": "VHN-129645" }, { "db": "BID", "id": "106524" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "CNNVD", "id": "CNNVD-201901-432" }, { "db": "NVD", "id": "CVE-2018-19027" } ] }, "id": "VAR-201901-0858", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "VULHUB", "id": "VHN-129645" } ], "trust": 1.468070575 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2019-01682" } ] }, "last_update_date": "2024-11-23T22:48:30.648000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.2.01 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2019\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Omron CX-One CX-Protocol patch for arbitrary code execution vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/150175" }, { "title": "Omron CX-One CX-Protocol Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88590" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "CNNVD", "id": "CNNVD-201901-432" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.8 }, { "problemtype": "CWE-704", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129645" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "NVD", "id": "CVE-2018-19027" } ] }, "references": { "_id": null, "data": [ { "trust": 5.6, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-010-02" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/106524" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19027" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu97716739/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19027" }, { "trust": 0.3, "url": "https://industrial.omron.us/en/home" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" }, { "db": "CNVD", "id": "CNVD-2019-01682" }, { "db": "VULHUB", "id": "VHN-129645" }, { "db": "BID", "id": "106524" }, { "db": "JVNDB", "id": "JVNDB-2019-001004" }, { "db": "CNNVD", "id": "CNNVD-201901-432" }, { "db": "NVD", "id": "CVE-2018-19027" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-19-120", "ident": null }, { "db": "ZDI", "id": "ZDI-19-019", "ident": null }, { "db": "ZDI", "id": "ZDI-19-017", "ident": null }, { "db": "ZDI", "id": "ZDI-19-018", "ident": null }, { "db": "CNVD", "id": "CNVD-2019-01682", "ident": null }, { "db": "VULHUB", "id": "VHN-129645", "ident": null }, { "db": "BID", "id": "106524", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201901-432", "ident": null }, { "db": "NVD", "id": "CVE-2018-19027", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-01-16T00:00:00", "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1", "ident": null }, { "date": "2019-01-24T00:00:00", "db": "ZDI", "id": "ZDI-19-120", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-019", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-017", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-018", "ident": null }, { "date": "2019-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-01682", "ident": null }, { "date": "2019-01-30T00:00:00", "db": "VULHUB", "id": "VHN-129645", "ident": null }, { "date": "2019-01-10T00:00:00", "db": "BID", "id": "106524", "ident": null }, { "date": "2019-01-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001004", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-432", "ident": null }, { "date": "2019-01-30T16:29:00.690000", "db": "NVD", "id": "CVE-2018-19027", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-01-24T00:00:00", "db": "ZDI", "id": "ZDI-19-120", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-019", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-017", "ident": null }, { "date": "2019-01-14T00:00:00", "db": "ZDI", "id": "ZDI-19-018", "ident": null }, { "date": "2019-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2019-01682", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-129645", "ident": null }, { "date": "2019-01-10T00:00:00", "db": "BID", "id": "106524", "ident": null }, { "date": "2019-08-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-001004", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201901-432", "ident": null }, { "date": "2024-11-21T03:57:11.363000", "db": "NVD", "id": "CVE-2018-19027", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201901-432" } ], "trust": 0.6 }, "title": { "_id": null, "data": "OMRON CX-One CX-Protocol CObject Type Confusion Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-19-120" }, { "db": "ZDI", "id": "ZDI-19-019" }, { "db": "ZDI", "id": "ZDI-19-017" }, { "db": "ZDI", "id": "ZDI-19-018" } ], "trust": 2.8 }, "type": { "_id": null, "data": "Code problem", "sources": [ { "db": "IVD", "id": "7d84a600-463f-11e9-9ea8-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201901-432" } ], "trust": 0.8 } }
var-202210-0092
Vulnerability from variot
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation's CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0092", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.78" }, { "model": "cx-programmer", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "9.78 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-23-222" } ], "trust": 0.7 }, "cve": "CVE-2022-3398", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-3398", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3398", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-3398", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3398", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-3398", "trust": 1.0, "value": "CRITICAL" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-3398", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-3398", "trust": 0.8, "value": "Critical" }, { "author": "ZDI", "id": "CVE-2022-3398", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-127", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "CNNVD", "id": "CNNVD-202210-127" }, { "db": "NVD", "id": "CVE-2022-3398" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation\u0027s CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition", "sources": [ { "db": "NVD", "id": "CVE-2022-3398" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "VULHUB", "id": "VHN-431035" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-3398", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-277-04", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU92014758", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018385", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15352", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-222", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202210-127", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-431035", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "VULHUB", "id": "VHN-431035" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "CNNVD", "id": "CNNVD-202210-127" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "id": "VAR-202210-0092", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-431035" } ], "trust": 0.63087795 }, "last_update_date": "2024-08-14T13:42:24.262000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "title": "Omron CX-Programmer Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209811" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "CNNVD", "id": "CNNVD-202210-127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-431035" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92014758/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3398" }, { "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-3398/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-277-04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "VULHUB", "id": "VHN-431035" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "CNNVD", "id": "CNNVD-202210-127" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-23-222" }, { "db": "VULHUB", "id": "VHN-431035" }, { "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "db": "CNNVD", "id": "CNNVD-202210-127" }, { "db": "NVD", "id": "CVE-2022-3398" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-222" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431035" }, { "date": "2023-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-127" }, { "date": "2022-10-06T18:16:22.803000", "db": "NVD", "id": "CVE-2022-3398" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-222" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431035" }, { "date": "2023-10-19T08:31:00", "db": "JVNDB", "id": "JVNDB-2022-018385" }, { "date": "2022-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-127" }, { "date": "2022-10-06T23:47:50.147000", "db": "NVD", "id": "CVE-2022-3398" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron Corporation\u0027s \u00a0CX-Programmer\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-127" } ], "trust": 0.6 } }
var-201812-0477
Vulnerability from variot
In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.23" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.24" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010184" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" } ], "trust": 0.7 }, "cve": "CVE-2018-18989", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-18989", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "CNVD-2018-25309", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-129603", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-010184", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-18989", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2018-18989", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-25309", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201812-127", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129603", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "description": { "_id": null, "data": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2", "sources": [ { "db": "NVD", "id": "CVE-2018-18989" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "BID", "id": "106106" }, { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-129603" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-18989", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-338-01", "trust": 3.4 }, { "db": "BID", "id": "106106", "trust": 2.6 }, { "db": "CNNVD", "id": "CNNVD-201812-127", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-25309", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90473043", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6608", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1367", "trust": 0.7 }, { "db": "IVD", "id": "7D806040-463F-11E9-AAA9-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-129603", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "id": "VAR-201812-0477", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" } ], "trust": 1.449529875 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" } ] }, "last_update_date": "2024-11-23T22:45:08.232000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "title": "Omron CX-One Memory Error Reference Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/147093" }, { "title": "Omron CX-One Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87423" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129603" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106106" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90473043/" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "db": "BID", "id": "106106", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-12-14T00:00:00", "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "date": "2018-12-04T22:29:00.277000", "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "date": "2024-11-21T03:56:59.737000", "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "BID", "id": "106106" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ], "trust": 0.9 }, "title": { "_id": null, "data": "Omron CX-One Memory Error Reference Vulnerability", "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Resource management error", "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ], "trust": 0.8 } }
var-201804-1656
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-283" } ], "trust": 0.7 }, "cve": "CVE-2018-7530", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137562", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7530", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7530", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2018-7530", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-07873", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137562", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7530" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7530", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5404", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-283", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137562", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "id": "VAR-201804-1656", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ] }, "last_update_date": "2024-11-23T22:17:35.160000Z", "patch": { "_id": null, "data": [ { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Omron CX-One code execution hole patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126153" }, { "title": "Omron CX-One Fixes for multiple software security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.8 }, { "problemtype": "CWE-118", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-122", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2018-04-17T19:29:00.387000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2024-11-21T04:12:18.397000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One Code execution hole", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Code problem", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.8 } }
var-202102-0317
Vulnerability from variot
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-182" } ], "trust": 0.7 }, "cve": "CVE-2020-27259", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27259", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370741", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27259", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27259", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27259" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27259", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-182", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11807", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370741", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "id": "VAR-202102-0317", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.455000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138518" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-822", "trust": 1.8 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-182/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2021-02-09T15:15:13.097000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2024-11-21T05:20:57.497000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 } }
var-202203-1537
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1537", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-578" } ], "trust": 0.7 }, "cve": "CVE-2022-26417", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26417", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418115", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26417", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001554", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26417", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26417", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26417", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26417", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-26417", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418115", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26417" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26417", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-578", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001554", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14753", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2481", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418115", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "id": "VAR-202203-1537", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418115" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-578/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26417" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26417/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-578" }, { "db": "VULHUB", "id": "VHN-418115" }, { "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-578" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418115" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "date": "2022-04-01T23:15:14.590000", "db": "NVD", "id": "CVE-2022-26417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-578" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418115" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001554" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2481" }, { "date": "2024-11-21T06:53:54.740000", "db": "NVD", "id": "CVE-2022-26417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Vulnerabilities in the use of freed memory", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2481" } ], "trust": 0.6 } }
var-201804-1567
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 2.8, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" } ], "trust": 2.8 }, "cve": "CVE-2018-8834", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-8834", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 2.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-8834", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07871", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-138866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-8834", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-8834", "trust": 2.8, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-8834", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-07871", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-790", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-138866", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-8834", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-8834" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" } ], "trust": 5.31 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-8834", "trust": 6.5 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.5 }, { "db": "CNVD", "id": "CNVD-2018-07871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-790", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5439", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-286", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5454", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-289", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5453", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-288", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5462", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-290", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EC2B30-39AB-11E9-8905-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-138866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-8834", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "id": "VAR-201804-1567", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" } ] }, "last_update_date": "2024-11-23T22:17:35.098000Z", "patch": { "_id": null, "data": [ { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Omron CX-One heap buffer overflow vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126149" }, { "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80159" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-122", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-138866" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "references": { "_id": null, "data": [ { "trust": 6.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "date": "2018-04-17T19:29:00.437000", "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "date": "2020-09-29T00:00:00", "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "date": "2020-09-29T00:00:00", "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "date": "2024-11-21T04:14:24.920000", "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-790" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One Heap Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-790" } ], "trust": 0.8 } }
var-202203-1536
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1536", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-581" } ], "trust": 0.7 }, "cve": "CVE-2022-26022", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26022", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418114", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001555", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26022", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-26022", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26022", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26022", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2022-26022", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-2480", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418114", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26022" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26022", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-581", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001555", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14778", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2480", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-73188", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418114", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "id": "VAR-202203-1536", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418114" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.923000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-581/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26022" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26022/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-581" }, { "db": "VULHUB", "id": "VHN-418114" }, { "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-581" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418114" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "date": "2022-04-01T23:15:14.530000", "db": "NVD", "id": "CVE-2022-26022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-581" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418114" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001555" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2480" }, { "date": "2024-11-21T06:53:19.680000", "db": "NVD", "id": "CVE-2022-26022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2480" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron\u00a0CX-Position\u00a0 Out-of-bounds Vulnerability in Microsoft", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001555" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2480" } ], "trust": 0.6 } }
var-202201-0707
Vulnerability from variot
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SDD files in the CXDrive module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from the Japanese company Omron. The product includes frequency converter, temperature controller and PLC programming software
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0707", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-one", "scope": null, "trust": 2.0, "vendor": "omron", "version": null }, { "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "model": "cx-one", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-one", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "4.60 and earlier" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" } ], "trust": 1.4 }, "cve": "CVE-2022-21137", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-21137", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2022-04998", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-409493", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-21137", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-21137", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001001", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2022-21137", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2022-21137", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-21137", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-001001", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-04998", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-427", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409493", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-21137", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" }, { "db": "VULMON", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "CNNVD", "id": "CNNVD-202201-427" }, { "db": "NVD", "id": "CVE-2022-21137" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SDD files in the CXDrive module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from the Japanese company Omron. The product includes frequency converter, temperature controller and PLC programming software", "sources": [ { "db": "NVD", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" }, { "db": "VULMON", "id": "CVE-2022-21137" } ], "trust": 3.6 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-21137", "trust": 4.6 }, { "db": "ICS CERT", "id": "ICSA-22-006-01", "trust": 2.6 }, { "db": "ZDI", "id": "ZDI-22-374", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-373", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU91728245", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001001", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14204", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14038", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04998", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-427", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022010704", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0081", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-409493", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-21137", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" }, { "db": "VULMON", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "CNNVD", "id": "CNNVD-202201-427" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "id": "VAR-202201-0707", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" } ], "trust": 1.23087795 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-04998" } ] }, "last_update_date": "2024-11-23T22:24:48.394000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "title": "CX-One\u00a0Ver.4\u00a0 Details of each software update", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Patch for Omron CX-One Buffer Overflow Vulnerability (CNVD-2022-04998)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/314551" }, { "title": "Omron CX-One Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=177260" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/AlphabugX/CVE-2022-RCE " } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULMON", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "CNNVD", "id": "CNNVD-202201-427" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409493" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 4.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "trust": 2.4, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-373/" }, { "trust": 1.9, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-374/" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21137" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91728245/index.html" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-006-01" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022010704" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0081" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" }, { "db": "VULMON", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "CNNVD", "id": "CNNVD-202201-427" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-374" }, { "db": "ZDI", "id": "ZDI-22-373" }, { "db": "CNVD", "id": "CNVD-2022-04998" }, { "db": "VULHUB", "id": "VHN-409493" }, { "db": "VULMON", "id": "CVE-2022-21137" }, { "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "db": "CNNVD", "id": "CNNVD-202201-427" }, { "db": "NVD", "id": "CVE-2022-21137" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "ZDI", "id": "ZDI-22-374" }, { "date": "2022-02-16T00:00:00", "db": "ZDI", "id": "ZDI-22-373" }, { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-04998" }, { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-409493" }, { "date": "2022-01-14T00:00:00", "db": "VULMON", "id": "CVE-2022-21137" }, { "date": "2022-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "date": "2022-01-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-427" }, { "date": "2022-01-14T20:15:15.687000", "db": "NVD", "id": "CVE-2022-21137" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "ZDI", "id": "ZDI-22-374" }, { "date": "2022-02-16T00:00:00", "db": "ZDI", "id": "ZDI-22-373" }, { "date": "2022-01-26T00:00:00", "db": "CNVD", "id": "CNVD-2022-04998" }, { "date": "2022-03-17T00:00:00", "db": "VULHUB", "id": "VHN-409493" }, { "date": "2022-03-17T00:00:00", "db": "VULMON", "id": "CVE-2022-21137" }, { "date": "2022-01-11T05:05:00", "db": "JVNDB", "id": "JVNDB-2022-001001" }, { "date": "2022-02-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-427" }, { "date": "2024-11-21T06:43:58.283000", "db": "NVD", "id": "CVE-2022-21137" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-427" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by OMRON \u00a0CX-One\u00a0 Stack-based buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-001001" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-427" } ], "trust": 0.6 } }
var-202208-2379
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-2379", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ], "trust": 0.7 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "ZDI-22-1150", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-22-1150", "trust": 0.7, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ], "trust": 0.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-15341", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1150", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "id": "VAR-202208-2379", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.27807203 }, "last_update_date": "2023-02-15T22:27:36.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.ia.omron.com/product/tool/26/cxone/e4_doc.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.7, "url": "https://www.ia.omron.com/product/tool/26/cxone/e4_doc.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1150" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1150" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1150" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-One CX-Programmer CXP File Parsing Use-After-Free Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-22-1150" } ], "trust": 0.7 } }
var-202210-0094
Vulnerability from variot
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation's CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.78" }, { "model": "cx-programmer", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "9.78 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-23-223" } ], "trust": 0.7 }, "cve": "CVE-2022-3396", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-3396", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3396", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-3396", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3396", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-3396", "trust": 1.0, "value": "CRITICAL" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-3396", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-3396", "trust": 0.8, "value": "Critical" }, { "author": "ZDI", "id": "CVE-2022-3396", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-128", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "CNNVD", "id": "CNNVD-202210-128" }, { "db": "NVD", "id": "CVE-2022-3396" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation\u0027s CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition", "sources": [ { "db": "NVD", "id": "CVE-2022-3396" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "VULHUB", "id": "VHN-431019" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-3396", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-277-04", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU92014758", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018387", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15353", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-223", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202210-128", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-431019", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "VULHUB", "id": "VHN-431019" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "CNNVD", "id": "CNNVD-202210-128" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "id": "VAR-202210-0094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-431019" } ], "trust": 0.63087795 }, "last_update_date": "2024-08-14T13:42:24.201000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "title": "Omron CX-Programmer Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209812" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "CNNVD", "id": "CNNVD-202210-128" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-431019" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92014758/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3396" }, { "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-3396/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-277-04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "VULHUB", "id": "VHN-431019" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "CNNVD", "id": "CNNVD-202210-128" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-23-223" }, { "db": "VULHUB", "id": "VHN-431019" }, { "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "db": "CNNVD", "id": "CNNVD-202210-128" }, { "db": "NVD", "id": "CVE-2022-3396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-223" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431019" }, { "date": "2023-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-128" }, { "date": "2022-10-06T18:16:21.840000", "db": "NVD", "id": "CVE-2022-3396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-223" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431019" }, { "date": "2023-10-19T08:31:00", "db": "JVNDB", "id": "JVNDB-2022-018387" }, { "date": "2022-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-128" }, { "date": "2022-10-06T23:44:26.567000", "db": "NVD", "id": "CVE-2022-3396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-128" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron Corporation\u0027s \u00a0CX-Programmer\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018387" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-128" } ], "trust": 0.6 } }
var-202102-0318
Vulnerability from variot
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 1.4, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "cve": "CVE-2020-27261", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27261", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370745", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2020-27261", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27261", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370745", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27261" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 2.97 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27261", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-185", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-21-183", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11810", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11808", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370745", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "id": "VAR-202102-0318", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.419000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138519" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "references": { "_id": null, "data": [ { "trust": 4.5, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-185/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-183/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2021-02-09T15:15:13.157000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2024-11-21T05:20:57.687000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 } }
var-202105-0677
Vulnerability from variot
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.29" }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "version 5.0.29.0 and earlier" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-588" } ], "trust": 0.7 }, "cve": "CVE-2021-27413", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-27413", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-386680", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27413", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001399", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27413", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-27413", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001399", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2021-27413", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202105-706", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-386680", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-27413", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "description": { "_id": null, "data": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier", "sources": [ { "db": "NVD", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" } ], "trust": 2.97 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2021-27413", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-21-131-01", "trust": 2.6 }, { "db": "ZDI", "id": "ZDI-21-588", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU90806326", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001399", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11845", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202105-706", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021051204", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1586", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-386680", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-27413", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "id": "VAR-202105-0677", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-386680" } ], "trust": 0.6495298749999999 }, "last_update_date": "2024-08-14T13:17:27.833000Z", "patch": { "_id": null, "data": [ { "title": "CX-One\u00a0 Version upgrade \u00a0 program \u00a0 download OMRON", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "title": "Omron CX-One Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151570" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202105-706" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-386680" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "references": { "_id": null, "data": [ { "trust": 3.9, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "trust": 2.5, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-588/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu90806326" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1586" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021051204" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-05-13T00:00:00", "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "date": "2021-05-13T00:00:00", "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "date": "2021-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "date": "2021-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "date": "2021-05-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "date": "2021-05-13T19:15:07.943000", "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-05-13T00:00:00", "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "date": "2021-05-21T00:00:00", "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "date": "2021-05-21T00:00:00", "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "date": "2021-05-14T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "date": "2021-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "date": "2021-05-21T16:34:32.723000", "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202105-706" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON \u00a0CX-One\u00a0 Stack-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001399" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-202102-0316
Vulnerability from variot
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-184" } ], "trust": 0.7 }, "cve": "CVE-2020-27257", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27257", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370737", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27257", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27257", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "description": { "_id": null, "data": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27257" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27257", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-184", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11809", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370737", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "id": "VAR-202102-0316", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.485000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138532" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.9 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-184/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2021-02-09T15:15:12.970000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-12T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2024-11-21T05:20:57.303000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 } }
var-201904-0185
Vulnerability from variot
When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Omron CX-Programmer is prone to an arbitrary code-execution vulnerability. Failed attempts will likely cause a denial-of-service condition. Omron CX-Programmer version 9.70 and prior are vulnerable; other versions may also be vulnerable. Both Omron CX-Programmer and Omron Common Components are products of Omron Corporation of Japan. Omron CX-Programmer is a PLC (Programmable Logic Controller) programming software. Omron Common Components is a PLC common component. This product includes PLC tools such as I/O table, PLC memory, PLC system setup, data trace/time graph monitoring, PLC error log, file memory, PLC clock, routing table and data link table. A resource management error vulnerability exists in Omron CX-Programmer 9.70 and earlier and Common Components 2019-1 and earlier. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.8, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": "common components", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2019-01" }, { "_id": null, "model": "common components", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "january 2019" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.71" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "BID", "id": "107773" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "NVD", "id": "CVE-2019-6556" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:common_components", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002360" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-19-344" } ], "trust": 0.7 }, "cve": "CVE-2019-6556", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-6556", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2019-002360", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-157991", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2019-6556", "impactScore": 4.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2019-002360", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2019-6556", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6556", "trust": 1.0, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2019-002360", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2019-6556", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-228", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-157991", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "VULHUB", "id": "VHN-157991" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "CNNVD", "id": "CNNVD-201904-228" }, { "db": "NVD", "id": "CVE-2019-6556" } ] }, "description": { "_id": null, "data": "When processing project files, the application (Omron CX-Programmer v9.70 and prior and Common Components January 2019 and prior) fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. Omron CX-Programmer is prone to an arbitrary code-execution vulnerability. Failed attempts will likely cause a denial-of-service condition. \nOmron CX-Programmer version 9.70 and prior are vulnerable; other versions may also be vulnerable. Both Omron CX-Programmer and Omron Common Components are products of Omron Corporation of Japan. Omron CX-Programmer is a PLC (Programmable Logic Controller) programming software. Omron Common Components is a PLC common component. This product includes PLC tools such as I/O table, PLC memory, PLC system setup, data trace/time graph monitoring, PLC error log, file memory, PLC clock, routing table and data link table. A resource management error vulnerability exists in Omron CX-Programmer 9.70 and earlier and Common Components 2019-1 and earlier. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products", "sources": [ { "db": "NVD", "id": "CVE-2019-6556" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "BID", "id": "107773" }, { "db": "VULHUB", "id": "VHN-157991" } ], "trust": 2.61 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2019-6556", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-19-094-01", "trust": 2.8 }, { "db": "ZDI", "id": "ZDI-19-344", "trust": 2.4 }, { "db": "BID", "id": "107773", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU98267543", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-002360", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6609", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201904-228", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.1152", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-157991", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "VULHUB", "id": "VHN-157991" }, { "db": "BID", "id": "107773" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "CNNVD", "id": "CNNVD-201904-228" }, { "db": "NVD", "id": "CVE-2019-6556" } ] }, "id": "VAR-201904-0185", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-157991" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T21:52:22.055000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.71 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2019\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2019\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-094-01" }, { "title": "Omron CX-Programmer Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91096" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "CNNVD", "id": "CNNVD-201904-228" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-416", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-157991" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "NVD", "id": "CVE-2019-6556" } ] }, "references": { "_id": null, "data": [ { "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-094-01" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-19-344/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6556" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/107773" }, { "trust": 0.9, "url": "https://industrial.omron.us/en/home" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6556" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98267543/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78474" } ], "sources": [ { "db": "ZDI", "id": "ZDI-19-344" }, { "db": "VULHUB", "id": "VHN-157991" }, { "db": "BID", "id": "107773" }, { "db": "JVNDB", "id": "JVNDB-2019-002360" }, { "db": "CNNVD", "id": "CNNVD-201904-228" }, { "db": "NVD", "id": "CVE-2019-6556" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-19-344", "ident": null }, { "db": "VULHUB", "id": "VHN-157991", "ident": null }, { "db": "BID", "id": "107773", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2019-002360", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201904-228", "ident": null }, { "db": "NVD", "id": "CVE-2019-6556", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2019-04-15T00:00:00", "db": "ZDI", "id": "ZDI-19-344", "ident": null }, { "date": "2019-04-10T00:00:00", "db": "VULHUB", "id": "VHN-157991", "ident": null }, { "date": "2019-04-04T00:00:00", "db": "BID", "id": "107773", "ident": null }, { "date": "2019-04-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002360", "ident": null }, { "date": "2019-04-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-228", "ident": null }, { "date": "2019-04-10T20:29:01.210000", "db": "NVD", "id": "CVE-2019-6556", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2019-04-15T00:00:00", "db": "ZDI", "id": "ZDI-19-344", "ident": null }, { "date": "2019-04-15T00:00:00", "db": "VULHUB", "id": "VHN-157991", "ident": null }, { "date": "2019-04-04T00:00:00", "db": "BID", "id": "107773", "ident": null }, { "date": "2019-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-002360", "ident": null }, { "date": "2019-04-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-228", "ident": null }, { "date": "2024-11-21T04:46:41.313000", "db": "NVD", "id": "CVE-2019-6556", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-228" } ], "trust": 0.6 }, "title": { "_id": null, "data": "OMRON CX-One Free memory usage vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-002360" } ], "trust": 0.8 }, "type": { "_id": null, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-228" } ], "trust": 0.6 } }
var-202203-1538
Vulnerability from variot
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-1538", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-one", "scope": null, "trust": 2.8, "vendor": "omron", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.5.3" }, { "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-position", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "2.5.3 and earlier" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" } ], "trust": 2.8 }, "cve": "CVE-2022-26419", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2022-26419", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-418116", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26419", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.8, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-26419", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2022-001553", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2022-26419", "trust": 2.8, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2022-26419", "trust": 1.0, "value": "HIGH" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-26419", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-26419", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-2487", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418116", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code. Omron CX-Position Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Omron CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Position is a position control software of Japan Omron Company. Simplifies all aspects of position control, from creating/editing data used in position control units (NC units) to online communication and monitoring operations", "sources": [ { "db": "NVD", "id": "CVE-2022-26419" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" } ], "trust": 4.23 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-26419", "trust": 6.1 }, { "db": "ICS CERT", "id": "ICSA-22-088-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-22-580", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-579", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-576", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-22-575", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU96756124", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-001553", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14776", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14775", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14676", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14674", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202203-2487", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022033010", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1347", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-418116", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "id": "VAR-202203-1538", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418116" } ], "trust": 0.63087795 }, "last_update_date": "2024-11-23T22:36:51.879000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "title": "top page", "trust": 0.8, "url": "https://www.fa.omron.co.jp/" }, { "title": "Omron CX-Position Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=188369" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.3, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-580/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-575/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-576/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-579/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96756124/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26419" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-088-02" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022033010" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-26419/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1347" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" }, { "db": "VULHUB", "id": "VHN-418116" }, { "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-580" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-579" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-576" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-575" }, { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-418116" }, { "date": "2022-04-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "date": "2022-03-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "date": "2022-04-01T23:15:14.647000", "db": "NVD", "id": "CVE-2022-26419" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-580" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-579" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-576" }, { "date": "2022-04-05T00:00:00", "db": "ZDI", "id": "ZDI-22-575" }, { "date": "2022-04-08T00:00:00", "db": "VULHUB", "id": "VHN-418116" }, { "date": "2022-04-19T05:47:00", "db": "JVNDB", "id": "JVNDB-2022-001553" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-2487" }, { "date": "2024-11-21T06:53:54.863000", "db": "NVD", "id": "CVE-2022-26419" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2487" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron CX-One CX-Position NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-22-580" }, { "db": "ZDI", "id": "ZDI-22-579" }, { "db": "ZDI", "id": "ZDI-22-576" }, { "db": "ZDI", "id": "ZDI-22-575" } ], "trust": 2.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-2487" } ], "trust": 0.6 } }
var-202210-0093
Vulnerability from variot
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation's CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0093", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.78" }, { "model": "cx-programmer", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "9.78 and earlier" }, { "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xina1i", "sources": [ { "db": "ZDI", "id": "ZDI-23-224" } ], "trust": 0.7 }, "cve": "CVE-2022-3397", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-3397", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ics-cert@hq.dhs.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3397", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-3397", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-3397", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-3397", "trust": 1.0, "value": "CRITICAL" }, { "author": "ics-cert@hq.dhs.gov", "id": "CVE-2022-3397", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-3397", "trust": 0.8, "value": "Critical" }, { "author": "ZDI", "id": "CVE-2022-3397", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-129", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "CNNVD", "id": "CNNVD-202210-129" }, { "db": "NVD", "id": "CVE-2022-3397" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code. Omron Corporation\u0027s CX-Programmer Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CXP files in the CX-Programmer module. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer", "sources": [ { "db": "NVD", "id": "CVE-2022-3397" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "VULHUB", "id": "VHN-431028" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-3397", "trust": 4.0 }, { "db": "ICS CERT", "id": "ICSA-22-277-04", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU92014758", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018386", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15355", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-224", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202210-129", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-431028", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "VULHUB", "id": "VHN-431028" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "CNNVD", "id": "CNNVD-202210-129" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "id": "VAR-202210-0093", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-431028" } ], "trust": 0.63087795 }, "last_update_date": "2024-08-14T13:42:24.231000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "title": "Omron CX-Programmer Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209813" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "CNNVD", "id": "CNNVD-202210-129" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-431028" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92014758/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3397" }, { "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-3397/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-277-04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "VULHUB", "id": "VHN-431028" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "CNNVD", "id": "CNNVD-202210-129" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-23-224" }, { "db": "VULHUB", "id": "VHN-431028" }, { "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "db": "CNNVD", "id": "CNNVD-202210-129" }, { "db": "NVD", "id": "CVE-2022-3397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-224" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431028" }, { "date": "2023-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "date": "2022-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-129" }, { "date": "2022-10-06T18:16:22.223000", "db": "NVD", "id": "CVE-2022-3397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-07T00:00:00", "db": "ZDI", "id": "ZDI-23-224" }, { "date": "2022-10-06T00:00:00", "db": "VULHUB", "id": "VHN-431028" }, { "date": "2023-10-19T08:31:00", "db": "JVNDB", "id": "JVNDB-2022-018386" }, { "date": "2022-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-129" }, { "date": "2022-10-06T23:49:13.997000", "db": "NVD", "id": "CVE-2022-3397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-129" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Omron Corporation\u0027s \u00a0CX-Programmer\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018386" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-129" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "16496DA0-9B7F-4EA1-AFE3-375A3C374A9C", "versionEndIncluding": "5.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Las versiones 4.60 y anteriores de Omron CX-One, incluidas las versiones 5.0.29.0 y anteriores de CX-Server, son vulnerables a un desbordamiento del b\u00fafer basado en la pila, que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27413", "lastModified": "2024-11-21T05:57:56.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-13T19:15:07.943", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106524 | Third Party Advisory | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106524 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-protocol | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAAAE41D-4A61-4ED4-9DCF-05FD7EFF3B3E", "versionEndIncluding": "4.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92EA8E6-7567-46FD-8CBE-6FEFC7D36C7B", "versionEndIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." }, { "lang": "es", "value": "Existen tres vulnerabilidades de confusi\u00f3n de tipos en CX-One, en versiones 4.50 y anteriores, y en CX-Protocol, en versiones 2.0 y anteriores, durante el procesamiento de archivos de proyecto. Un atacante podr\u00eda usar un archivo de proyecto especialmente manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n." } ], "id": "CVE-2018-19027", "lastModified": "2024-11-21T03:57:11.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-30T16:29:00.690", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/106524" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/106524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-704" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." }, { "lang": "es", "value": "Esta vulnerabilidad permite a atacantes locales ejecutar c\u00f3digo arbitrario debido a una falta de comprobaci\u00f3n apropiada de los datos suministrados por un usuario, lo que puede resultar en una condici\u00f3n de confusi\u00f3n de tipos en Omron CX-One Versi\u00f3n 4.60 y dispositivos anteriores" } ], "id": "CVE-2020-27257", "lastModified": "2024-11-21T05:20:57.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:12.970", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-22-373/ | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-22-374/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-373/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-22-374/ | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Omron CX-One versiones 4.60 y anteriores, son vulnerables a un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria mientras son procesados archivos de proyectos espec\u00edficos, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-21137", "lastModified": "2024-11-21T06:43:58.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-14T20:15:15.687", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila." } ], "id": "CVE-2018-7514", "lastModified": "2024-11-21T04:12:16.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)." } ], "id": "CVE-2018-8834", "lastModified": "2024-11-21T04:14:24.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.437", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible." } ], "id": "CVE-2018-7530", "lastModified": "2024-11-21T04:12:18.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.387", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-118" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "Omron CX-One versiones 4.60 y anteriores, puede permitir a un atacante suministrar un puntero a ubicaciones de memoria arbitrarias, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27259", "lastModified": "2024-11-21T05:20:57.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.097", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B67C07-935C-419E-A5AE-ACD3CE63594A", "versionEndIncluding": "9.66", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C3D8DD-E0F1-4DA3-8C07-63920456A26F", "versionEndIncluding": "5.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." }, { "lang": "es", "value": "En CX-One, en versiones 4.42 y anteriores (CX-Programmer en versiones 9.66 y anteriores y CX-Server en versiones 5.0.23 y anteriores), al procesar archivos de proyecto, la aplicaci\u00f3n no comprueba si se est\u00e1 referenciando memoria liberada. Un atacante podr\u00eda emplear un archivo de proyecto manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n." } ], "id": "CVE-2018-18989", "lastModified": "2024-11-21T03:56:59.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T22:29:00.277", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B67C07-935C-419E-A5AE-ACD3CE63594A", "versionEndIncluding": "9.66", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C3D8DD-E0F1-4DA3-8C07-63920456A26F", "versionEndIncluding": "5.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." }, { "lang": "es", "value": "Se han descubierto dos vulnerabilidades de desbordamiento de b\u00fafer basado en pila en CX-One, en versiones 4.42 y anteriores (CX-Programmer en versiones 9.66 y anteriores y CX-Server en versiones 5.0.23 y anteriores). Al procesar archivos de proyecto, la aplicaci\u00f3n permite que los datos de entrada excedan el b\u00fafer. Un atacante podr\u00eda emplear un archivo de proyecto manipulado para desbordar el b\u00fafer y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n." } ], "id": "CVE-2018-18993", "lastModified": "2024-11-21T03:57:00.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T22:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "El Omron CX-One versiones 4.60 y anteriores es vulnerable a un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27261", "lastModified": "2024-11-21T05:20:57.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.157", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-21137
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-373/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-374/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:31:59.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "All", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "datePublic": "2022-01-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-16T18:06:21", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/" } ], "solutions": [ { "lang": "en", "value": "Omron has released an updated version of CX-One to address the reported vulnerability. The following release is available through the CX-One auto-update service: CX-Server: Version 5.0.29.2" } ], "source": { "advisory": "ICSA-22-006-01", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2022-01-06T19:55:00.000Z", "ID": "CVE-2022-21137", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "All", "version_value": "4.60" } ] } } ] }, "vendor_name": "Omron" } ] } }, "credit": [ { "lang": "eng", "value": "xina1i, working with Trend Micro\u2019s Zero Day Initiative, reported these vulnerabilities to CISA." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121 Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-006-01" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-373/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-374/" } ] }, "solution": [ { "lang": "en", "value": "Omron has released an updated version of CX-One to address the reported vulnerability. The following release is available through the CX-One auto-update service: CX-Server: Version 5.0.29.2" } ], "source": { "advisory": "ICSA-22-006-01", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-21137", "datePublished": "2022-01-14T19:10:44.165950Z", "dateReserved": "2021-12-21T00:00:00", "dateUpdated": "2024-09-16T20:27:32.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7514
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:03.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7514", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T23:35:36.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:13", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27257", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27257", "datePublished": "2021-02-09T14:10:19.507744Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T02:47:28.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8834
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "HEAP-BASED BUFFER OVERFLOW CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-8834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HEAP-BASED BUFFER OVERFLOW CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-8834", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-09-16T19:25:23.504Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-19027
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106524 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Omron | CX-Protocol within CX-One |
Version: CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106524", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106524" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-Protocol within CX-One", "vendor": "Omron", "versions": [ { "status": "affected", "version": "CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior" } ] } ], "datePublic": "2019-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-31T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "106524", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106524" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2019-01-10T00:00:00", "ID": "CVE-2018-19027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-Protocol within CX-One", "version": { "version_data": [ { "version_value": "CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "106524", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106524" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-19027", "datePublished": "2019-01-30T16:00:00Z", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2024-09-16T17:09:00.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27261", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27261", "datePublished": "2021-02-09T14:09:34.782476Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T00:02:18.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7530
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7530", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T16:28:21.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106106 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CX-One (CX-Programmer and CX-Server) |
Version: CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One (CX-Programmer and CX-Server)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "USE AFTER FREE CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-18989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One (CX-Programmer and CX-Server)", "version": { "version_data": [ { "version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE AFTER FREE CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106106" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-18989", "datePublished": "2018-12-04T22:00:00", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2024-08-05T11:23:08.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27259
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "UNTRUSTED POINTER DEREFERENCE CWE-822", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:18", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27259", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27259", "datePublished": "2021-02-09T14:09:11.732043Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-16T16:33:13.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27413
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Omron CX-One |
Version: CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:16.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-13T18:56:33", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27413", "datePublished": "2021-05-13T18:56:33", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:16.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106106 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CX-One (CX-Programmer and CX-Server) |
Version: CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One (CX-Programmer and CX-Server)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-18993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One (CX-Programmer and CX-Server)", "version": { "version_data": [ { "version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106106" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-18993", "datePublished": "2018-12-04T22:00:00", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2024-08-05T11:23:08.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }