Vulnerabilites related to Omron - CX-Server
var-201812-0479
Vulnerability from variot
Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 1.4, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.23" }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.24" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010184" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" } ], "trust": 1.4 }, "cve": "CVE-2018-18993", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-18993", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-25281", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "7d808751-463f-11e9-abf0-000c29342cb1", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-129608", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18993", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-010184", "trust": 1.6, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2018-18993", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2018-18993", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-25281", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201812-128", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129608", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-18993", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "description": { "_id": null, "data": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2", "sources": [ { "db": "NVD", "id": "CVE-2018-18993" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "BID", "id": "106106" }, { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" } ], "trust": 4.05 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-18993", "trust": 5.1 }, { "db": "ICS CERT", "id": "ICSA-18-338-01", "trust": 3.5 }, { "db": "BID", "id": "106106", "trust": 2.7 }, { "db": "CNNVD", "id": "CNNVD-201812-128", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-25281", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90473043", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6610", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1368", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6603", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1366", "trust": 0.7 }, { "db": "IVD", "id": "7D808751-463F-11E9-ABF0-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-129608", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-18993", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "id": "VAR-201812-0479", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" } ], "trust": 1.449529875 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" } ] }, "last_update_date": "2024-11-23T22:45:08.278000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Omron CX-One Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/146977" }, { "title": "Omron CX-One Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87424" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129608" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "references": { "_id": null, "data": [ { "trust": 5.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/106106" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90473043/" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1368" }, { "db": "ZDI", "id": "ZDI-18-1366" }, { "db": "CNVD", "id": "CNVD-2018-25281" }, { "db": "VULHUB", "id": "VHN-129608" }, { "db": "VULMON", "id": "CVE-2018-18993" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-128" }, { "db": "NVD", "id": "CVE-2018-18993" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "db": "BID", "id": "106106", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-12-14T00:00:00", "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "date": "2018-12-13T00:00:00", "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "date": "2018-12-04T22:29:00.340000", "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1368", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1366", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25281", "ident": null }, { "date": "2020-09-18T00:00:00", "db": "VULHUB", "id": "VHN-129608", "ident": null }, { "date": "2020-09-18T00:00:00", "db": "VULMON", "id": "CVE-2018-18993", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2020-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-128", "ident": null }, { "date": "2024-11-21T03:57:00.207000", "db": "NVD", "id": "CVE-2018-18993", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "BID", "id": "106106" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ], "trust": 0.9 }, "title": { "_id": null, "data": "Omron CX-One Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25281" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "7d808751-463f-11e9-abf0-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201812-128" } ], "trust": 0.8 } }
var-201804-1654
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 3.5, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" } ], "trust": 3.5 }, "cve": "CVE-2018-7514", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 3.5, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07872", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137546", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7514", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-7514", "trust": 3.5, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7514", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-07872", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7514" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 5.85 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7514", "trust": 7.1 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07872", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5440", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-287", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5402", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-281", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5405", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-284", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5403", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-282", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5406", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-285", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137546", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "id": "VAR-201804-1654", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" } ] }, "last_update_date": "2024-11-23T22:17:35.032000Z", "patch": { "_id": null, "data": [ { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126151" }, { "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-122", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "references": { "_id": null, "data": [ { "trust": 6.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2018-04-17T19:29:00.340000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2020-10-02T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2024-11-21T04:12:16.637000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.6 }, "title": { "_id": null, "data": "OMRON CX-One Multiple vulnerabilities in applications included", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.8 } }
var-201812-0477
Vulnerability from variot
In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.66" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.23" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.3, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.24" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.70" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010184" } ] }, "credits": { "_id": null, "data": "Esteban Ruiz (mr_me) of Source Incite", "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" } ], "trust": 0.7 }, "cve": "CVE-2018-18989", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-18989", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 6.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "High", "accessVector": "Local", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Complete", "baseScore": 5.2, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "CNVD-2018-25309", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "impactScore": 8.5, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-129603", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "High", "baseScore": 5.8, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-010184", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-18989", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-010184", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-18989", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2018-18989", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-25309", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201812-127", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-129603", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "description": { "_id": null, "data": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2", "sources": [ { "db": "NVD", "id": "CVE-2018-18989" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "BID", "id": "106106" }, { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-129603" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-18989", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-338-01", "trust": 3.4 }, { "db": "BID", "id": "106106", "trust": 2.6 }, { "db": "CNNVD", "id": "CNNVD-201812-127", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2018-25309", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU90473043", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-6608", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-1367", "trust": 0.7 }, { "db": "IVD", "id": "7D806040-463F-11E9-AAA9-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-129603", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "id": "VAR-201812-0477", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" } ], "trust": 1.449529875 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" } ] }, "last_update_date": "2024-11-23T22:45:08.232000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "title": "Omron CX-One Memory Error Reference Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/147093" }, { "title": "Omron CX-One Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87423" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-129603" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/106106" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu90473043/" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-1367" }, { "db": "CNVD", "id": "CNVD-2018-25309" }, { "db": "VULHUB", "id": "VHN-129603" }, { "db": "BID", "id": "106106" }, { "db": "JVNDB", "id": "JVNDB-2018-010184" }, { "db": "CNNVD", "id": "CNNVD-201812-127" }, { "db": "NVD", "id": "CVE-2018-18989" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "db": "BID", "id": "106106", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-12-14T00:00:00", "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1", "ident": null }, { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "date": "2018-12-04T22:29:00.277000", "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-12-10T00:00:00", "db": "ZDI", "id": "ZDI-18-1367", "ident": null }, { "date": "2018-12-14T00:00:00", "db": "CNVD", "id": "CNVD-2018-25309", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-129603", "ident": null }, { "date": "2018-12-04T00:00:00", "db": "BID", "id": "106106", "ident": null }, { "date": "2018-12-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010184", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201812-127", "ident": null }, { "date": "2024-11-21T03:56:59.737000", "db": "NVD", "id": "CVE-2018-18989", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "BID", "id": "106106" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ], "trust": 0.9 }, "title": { "_id": null, "data": "Omron CX-One Memory Error Reference Vulnerability", "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-25309" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Resource management error", "sources": [ { "db": "IVD", "id": "7d806040-463f-11e9-aaa9-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201812-127" } ], "trust": 0.8 } }
var-201804-1656
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-283" } ], "trust": 0.7 }, "cve": "CVE-2018-7530", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137562", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7530", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7530", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2018-7530", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-07873", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137562", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7530" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7530", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5404", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-283", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137562", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "id": "VAR-201804-1656", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ] }, "last_update_date": "2024-11-23T22:17:35.160000Z", "patch": { "_id": null, "data": [ { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Omron CX-One code execution hole patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126153" }, { "title": "Omron CX-One Fixes for multiple software security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.8 }, { "problemtype": "CWE-118", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-122", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2018-04-17T19:29:00.387000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2024-11-21T04:12:18.397000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One Code execution hole", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Code problem", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.8 } }
var-202102-0317
Vulnerability from variot
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-182" } ], "trust": 0.7 }, "cve": "CVE-2020-27259", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27259", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370741", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27259", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27259", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27259", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27259" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27259", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-182", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11807", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-405", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370741", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "id": "VAR-202102-0317", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370741" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.455000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Various product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138518" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-822", "trust": 1.8 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-182/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-182" }, { "db": "VULHUB", "id": "VHN-370741" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-405" }, { "db": "NVD", "id": "CVE-2020-27259" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2021-02-09T15:15:13.097000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-182", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370741", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-405", "ident": null }, { "date": "2024-11-21T05:20:57.497000", "db": "NVD", "id": "CVE-2020-27259", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-405" } ], "trust": 0.6 } }
var-201804-1567
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 2.8, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" } ], "trust": 2.8 }, "cve": "CVE-2018-8834", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-8834", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 2.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-8834", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07871", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-138866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-8834", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-8834", "trust": 2.8, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-8834", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-07871", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-790", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-138866", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-8834", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-8834" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" } ], "trust": 5.31 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-8834", "trust": 6.5 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.5 }, { "db": "CNVD", "id": "CNVD-2018-07871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-790", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5439", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-286", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5454", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-289", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5453", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-288", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5462", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-290", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EC2B30-39AB-11E9-8905-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-138866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-8834", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "id": "VAR-201804-1567", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" } ] }, "last_update_date": "2024-11-23T22:17:35.098000Z", "patch": { "_id": null, "data": [ { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 2.8, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Omron CX-One heap buffer overflow vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126149" }, { "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80159" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-122", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-138866" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "references": { "_id": null, "data": [ { "trust": 6.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-286" }, { "db": "ZDI", "id": "ZDI-18-289" }, { "db": "ZDI", "id": "ZDI-18-288" }, { "db": "ZDI", "id": "ZDI-18-290" }, { "db": "CNVD", "id": "CNVD-2018-07871" }, { "db": "VULHUB", "id": "VHN-138866" }, { "db": "VULMON", "id": "CVE-2018-8834" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-790" }, { "db": "NVD", "id": "CVE-2018-8834" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "date": "2018-04-17T19:29:00.437000", "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-286", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-289", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-288", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-290", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07871", "ident": null }, { "date": "2020-09-29T00:00:00", "db": "VULHUB", "id": "VHN-138866", "ident": null }, { "date": "2020-09-29T00:00:00", "db": "VULMON", "id": "CVE-2018-8834", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2020-09-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-790", "ident": null }, { "date": "2024-11-21T04:14:24.920000", "db": "NVD", "id": "CVE-2018-8834", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-790" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One Heap Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07871" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-790" } ], "trust": 0.8 } }
var-202102-0318
Vulnerability from variot
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 1.4, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "cve": "CVE-2020-27261", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27261", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370745", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-27261", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2020-27261", "trust": 1.4, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27261", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370745", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "description": { "_id": null, "data": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27261" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 2.97 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27261", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-185", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-21-183", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11810", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11808", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-408", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370745", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "id": "VAR-202102-0318", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370745" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.419000Z", "patch": { "_id": null, "data": [ { "title": "Omron has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138519" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "references": { "_id": null, "data": [ { "trust": 4.5, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-185/" }, { "trust": 1.7, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-183/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" }, { "db": "VULHUB", "id": "VHN-370745" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-408" }, { "db": "NVD", "id": "CVE-2020-27261" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2021-02-09T15:15:13.157000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-185", "ident": null }, { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-183", "ident": null }, { "date": "2021-02-11T00:00:00", "db": "VULHUB", "id": "VHN-370745", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-408", "ident": null }, { "date": "2024-11-21T05:20:57.687000", "db": "NVD", "id": "CVE-2020-27261", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-185" }, { "db": "ZDI", "id": "ZDI-21-183" } ], "trust": 1.4 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-408" } ], "trust": 0.6 } }
var-202105-0677
Vulnerability from variot
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.29" }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e", "version": "version 5.0.29.0 and earlier" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-588" } ], "trust": 0.7 }, "cve": "CVE-2021-27413", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-27413", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-386680", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27413", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001399", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27413", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-27413", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001399", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2021-27413", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202105-706", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-386680", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-27413", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "description": { "_id": null, "data": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier", "sources": [ { "db": "NVD", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" } ], "trust": 2.97 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2021-27413", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-21-131-01", "trust": 2.6 }, { "db": "ZDI", "id": "ZDI-21-588", "trust": 2.5 }, { "db": "JVN", "id": "JVNVU90806326", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001399", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11845", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202105-706", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021051204", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1586", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-386680", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-27413", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "id": "VAR-202105-0677", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-386680" } ], "trust": 0.6495298749999999 }, "last_update_date": "2024-08-14T13:17:27.833000Z", "patch": { "_id": null, "data": [ { "title": "CX-One\u00a0 Version upgrade \u00a0 program \u00a0 download OMRON", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "title": "Omron CX-One Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151570" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202105-706" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 1.0 }, { "problemtype": "Stack-based buffer overflow (CWE-121) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-386680" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "references": { "_id": null, "data": [ { "trust": 3.9, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "trust": 2.5, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-588/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu90806326" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1586" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021051204" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-588" }, { "db": "VULHUB", "id": "VHN-386680" }, { "db": "VULMON", "id": "CVE-2021-27413" }, { "db": "JVNDB", "id": "JVNDB-2021-001399" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202105-706" }, { "db": "NVD", "id": "CVE-2021-27413" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-05-13T00:00:00", "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "date": "2021-05-13T00:00:00", "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "date": "2021-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "date": "2021-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "date": "2021-05-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "date": "2021-05-13T19:15:07.943000", "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-05-13T00:00:00", "db": "ZDI", "id": "ZDI-21-588", "ident": null }, { "date": "2021-05-21T00:00:00", "db": "VULHUB", "id": "VHN-386680", "ident": null }, { "date": "2021-05-21T00:00:00", "db": "VULMON", "id": "CVE-2021-27413", "ident": null }, { "date": "2021-05-14T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-001399", "ident": null }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975", "ident": null }, { "date": "2021-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-706", "ident": null }, { "date": "2021-05-21T16:34:32.723000", "db": "NVD", "id": "CVE-2021-27413", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202105-706" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON \u00a0CX-One\u00a0 Stack-based buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001399" } ], "trust": 0.8 }, "type": { "_id": null, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-202102-0316
Vulnerability from variot
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.60" }, { "_id": null, "model": "cx-position", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.52" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.28" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "2.02" }, { "_id": null, "model": "cx-position", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.8, "vendor": "omron", "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-position", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-21-184" } ], "trust": 0.7 }, "cve": "CVE-2020-27257", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-27257", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-370737", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "Low", "baseScore": 6.6, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 1.6, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "IPA score", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-001004", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27257", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 1.6, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27257", "trust": 1.0, "value": "HIGH" }, { "author": "IPA", "id": "JVNDB-2021-001004", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-27257", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-370737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "description": { "_id": null, "data": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior", "sources": [ { "db": "NVD", "id": "CVE-2020-27257" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 2.34 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2020-27257", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-21-007-02", "trust": 2.5 }, { "db": "ZDI", "id": "ZDI-21-184", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95231601", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11809", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0077", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202101-423", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-370737", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "id": "VAR-202102-0316", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-370737" } ], "trust": 0.6681076499999999 }, "last_update_date": "2024-11-23T22:47:42.485000Z", "patch": { "_id": null, "data": [ { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position" }, { "title": "Omron has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "title": "Omron Repair measures for buffer errors and vulnerabilities in many products", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138532" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.9 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-822", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "references": { "_id": null, "data": [ { "trust": 3.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "trust": 2.3, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-184/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu95231601" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-184" }, { "db": "VULHUB", "id": "VHN-370737" }, { "db": "JVNDB", "id": "JVNDB-2021-001004" }, { "db": "CNNVD", "id": "CNNVD-202101-423" }, { "db": "NVD", "id": "CVE-2020-27257" } ] }, "sources": { "_id": null, "data": [ { "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-09T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-01-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2021-02-09T15:15:12.970000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2021-02-10T00:00:00", "db": "ZDI", "id": "ZDI-21-184", "ident": null }, { "date": "2021-02-12T00:00:00", "db": "VULHUB", "id": "VHN-370737", "ident": null }, { "date": "2021-01-14T06:41:19", "db": "JVNDB", "id": "JVNDB-2021-001004", "ident": null }, { "date": "2021-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-423", "ident": null }, { "date": "2024-11-21T05:20:57.303000", "db": "NVD", "id": "CVE-2020-27257", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Made by OMRON CX-One Multiple vulnerabilities in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-001004" } ], "trust": 0.8 }, "type": { "_id": null, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-423" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "16496DA0-9B7F-4EA1-AFE3-375A3C374A9C", "versionEndIncluding": "5.0.29", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." }, { "lang": "es", "value": "Las versiones 4.60 y anteriores de Omron CX-One, incluidas las versiones 5.0.29.0 y anteriores de CX-Server, son vulnerables a un desbordamiento del b\u00fafer basado en la pila, que puede permitir a un atacante ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27413", "lastModified": "2024-11-21T05:57:56.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-05-13T19:15:07.943", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." }, { "lang": "es", "value": "Esta vulnerabilidad permite a atacantes locales ejecutar c\u00f3digo arbitrario debido a una falta de comprobaci\u00f3n apropiada de los datos suministrados por un usuario, lo que puede resultar en una condici\u00f3n de confusi\u00f3n de tipos en Omron CX-One Versi\u00f3n 4.60 y dispositivos anteriores" } ], "id": "CVE-2020-27257", "lastModified": "2024-11-21T05:20:57.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:12.970", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila." } ], "id": "CVE-2018-7514", "lastModified": "2024-11-21T04:12:16.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)." } ], "id": "CVE-2018-8834", "lastModified": "2024-11-21T04:14:24.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.437", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible." } ], "id": "CVE-2018-7530", "lastModified": "2024-11-21T04:12:18.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.387", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-118" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "Omron CX-One versiones 4.60 y anteriores, puede permitir a un atacante suministrar un puntero a ubicaciones de memoria arbitrarias, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27259", "lastModified": "2024-11-21T05:20:57.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.097", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B67C07-935C-419E-A5AE-ACD3CE63594A", "versionEndIncluding": "9.66", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C3D8DD-E0F1-4DA3-8C07-63920456A26F", "versionEndIncluding": "5.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." }, { "lang": "es", "value": "En CX-One, en versiones 4.42 y anteriores (CX-Programmer en versiones 9.66 y anteriores y CX-Server en versiones 5.0.23 y anteriores), al procesar archivos de proyecto, la aplicaci\u00f3n no comprueba si se est\u00e1 referenciando memoria liberada. Un atacante podr\u00eda emplear un archivo de proyecto manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n." } ], "id": "CVE-2018-18989", "lastModified": "2024-11-21T03:56:59.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T22:29:00.277", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106106 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6B67C07-935C-419E-A5AE-ACD3CE63594A", "versionEndIncluding": "9.66", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "15C3D8DD-E0F1-4DA3-8C07-63920456A26F", "versionEndIncluding": "5.0.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." }, { "lang": "es", "value": "Se han descubierto dos vulnerabilidades de desbordamiento de b\u00fafer basado en pila en CX-One, en versiones 4.42 y anteriores (CX-Programmer en versiones 9.66 y anteriores y CX-Server en versiones 5.0.23 y anteriores). Al procesar archivos de proyecto, la aplicaci\u00f3n permite que los datos de entrada excedan el b\u00fafer. Un atacante podr\u00eda emplear un archivo de proyecto manipulado para desbordar el b\u00fafer y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n." } ], "id": "CVE-2018-18993", "lastModified": "2024-11-21T03:57:00.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-04T22:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
ics-cert@hq.dhs.gov | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-one | * | |
omron | cx-position | * | |
omron | cx-protocol | * | |
omron | cx-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2", "versionEndIncluding": "4.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2", "versionEndIncluding": "2.52", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A", "versionEndIncluding": "2.02", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4", "versionEndIncluding": "5.0.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." }, { "lang": "es", "value": "El Omron CX-One versiones 4.60 y anteriores es vulnerable a un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente" } ], "id": "CVE-2020-27261", "lastModified": "2024-11-21T05:20:57.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T15:15:13.157", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2018-7514
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:03.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7514", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T23:35:36.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-184/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:13", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27257", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27257", "datePublished": "2021-02-09T14:10:19.507744Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T02:47:28.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8834
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "HEAP-BASED BUFFER OVERFLOW CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-8834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HEAP-BASED BUFFER OVERFLOW CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-8834", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-03-20T00:00:00", "dateUpdated": "2024-09-16T19:25:23.504Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-183/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-185/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:17", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27261", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27261", "datePublished": "2021-02-09T14:09:34.782476Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-17T00:02:18.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-7530
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7530", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T16:28:21.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106106 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CX-One (CX-Programmer and CX-Server) |
Version: CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.511Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One (CX-Programmer and CX-Server)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "USE AFTER FREE CWE-416", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-18989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One (CX-Programmer and CX-Server)", "version": { "version_data": [ { "version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "USE AFTER FREE CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106106" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-18989", "datePublished": "2018-12-04T22:00:00", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2024-08-05T11:23:08.511Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27259
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-182/ | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Omron | CX-One |
Version: unspecified < |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "4.60", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Protocol", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.02", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Server", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "5.0.28", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "CX-Position", "vendor": "Omron", "versions": [ { "lessThanOrEqual": "2.52", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "UNTRUSTED POINTER DEREFERENCE CWE-822", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-10T18:06:18", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ], "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" }, "title": "Omron CX-One", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2021-01-07T17:00:00.000Z", "ID": "CVE-2020-27259", "STATE": "PUBLIC", "TITLE": "Omron CX-One" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "4.60" } ] } }, { "product_name": "CX-Protocol", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.02" } ] } }, { "product_name": "CX-Server", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "5.0.28" } ] } }, { "product_name": "CX-Position", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.52" } ] } } ] }, "vendor_name": "Omron" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/" } ] }, "source": { "advisory": "ICSA-21-007-02", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-27259", "datePublished": "2021-02-09T14:09:11.732043Z", "dateReserved": "2020-10-19T00:00:00", "dateUpdated": "2024-09-16T16:33:13.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27413
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-588/ | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Omron CX-One |
Version: CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:16.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-13T18:56:33", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27413", "datePublished": "2021-05-13T18:56:33", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:16.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-18993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106106 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | CX-One (CX-Programmer and CX-Server) |
Version: CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:23:08.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CX-One (CX-Programmer and CX-Server)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } ], "datePublic": "2018-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-06T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-18993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CX-One (CX-Programmer and CX-Server)", "version": { "version_data": [ { "version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01" }, { "name": "106106", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106106" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-18993", "datePublished": "2018-12-04T22:00:00", "dateReserved": "2018-11-06T00:00:00", "dateUpdated": "2024-08-05T11:23:08.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }