Vulnerabilites related to Omron - CX-Supervisor
cve-2018-19011
Vulnerability from cvelistv5
Published
2019-01-22 20:00
Modified
2024-09-16 20:57
Severity ?
Summary
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.918Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106654",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106654"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "IMPROPER CONTROL OF GENERATION OF CODE (\u0027CODE INJECTION\u0027) CWE-94",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-23T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106654",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106654"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19011",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER CONTROL OF GENERATION OF CODE (\u0027CODE INJECTION\u0027) CWE-94"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106654",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106654"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19011",
    "datePublished": "2019-01-22T20:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-16T20:57:24.608Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17913
Vulnerability from cvelistv5
Published
2018-11-05 23:00
Modified
2024-09-16 17:47
Severity ?
Summary
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.
References
Impacted products
Vendor Product Version
Omron CX-Supervisor Version: Versions 3.4.1.0 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:01:14.784Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
          },
          {
            "name": "105691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "Omron",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.4.1.0 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-704",
              "description": "INCORRECT TYPE VERSION OR CAST CWE-704",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-06T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
        },
        {
          "name": "105691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-10-17T00:00:00",
          "ID": "CVE-2018-17913",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.4.1.0 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "INCORRECT TYPE VERSION OR CAST CWE-704"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
            },
            {
              "name": "105691",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-17913",
    "datePublished": "2018-11-05T23:00:00Z",
    "dateReserved": "2018-10-02T00:00:00",
    "dateUpdated": "2024-09-16T17:47:42.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-20836
Vulnerability from cvelistv5
Published
2021-10-19 02:00
Modified
2024-08-03 17:53
Severity ?
Summary
Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.
Impacted products
Vendor Product Version
OMRON Corporation OMRON CX-Supervisor Version: v4.0.0.13 and v4.0.0.16
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:22.875Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU90041391/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "OMRON CX-Supervisor",
          "vendor": "OMRON Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "v4.0.0.13 and v4.0.0.16"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds Read",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-19T02:00:22",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU90041391/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2021-20836",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "OMRON CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "v4.0.0.13 and v4.0.0.16"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "OMRON Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Out-of-bounds Read"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.myomron.com/index.php?action=kb\u0026article=1692",
              "refsource": "MISC",
              "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU90041391/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU90041391/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2021-20836",
    "datePublished": "2021-10-19T02:00:22",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:53:22.875Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7523
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-16 16:37
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:03.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-415",
              "description": "DOUBLE FREE CWE-415",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7523",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "DOUBLE FREE CWE-415"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7523",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T16:37:44.622Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7521
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-16 19:04
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:03.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "USE AFTER FREE CWE-416",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7521",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE AFTER FREE CWE-416"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7521",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T19:04:25.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-18251
Vulnerability from cvelistv5
Published
2019-11-25 23:29
Modified
2024-08-05 01:47
Severity ?
Summary
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.
Impacted products
Vendor Product Version
n/a Omron CX-Supervisor Version: Versions 3.5 (12) and prior
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:47:14.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.5 (12) and prior"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-477",
              "description": "USE OF OBSOLETE FUNCTION CWE-477",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-10T01:06:07",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "ID": "CVE-2019-18251",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.5 (12) and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE OF OBSOLETE FUNCTION CWE-477"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04",
              "refsource": "MISC",
              "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2019-18251",
    "datePublished": "2019-11-25T23:29:02",
    "dateReserved": "2019-10-22T00:00:00",
    "dateUpdated": "2024-08-05T01:47:14.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7517
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-17 02:21
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "OUT-OF-BOUNDS WRITE CWE-787",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7517",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "OUT-OF-BOUNDS WRITE CWE-787"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7517",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-17T02:21:26.823Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7515
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-17 02:52
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.117Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "BeaconMed\u0026#195;\u0026#166;s TotalAlert Scroll Medical Air Systems web application",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "All versions prior to version 4107600010.23"
            }
          ]
        }
      ],
      "datePublic": "2018-05-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-256",
              "description": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-05-24T00:00:00",
          "ID": "CVE-2018-7515",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BeaconMed\u0026#195;\u0026#166;s TotalAlert Scroll Medical Air Systems web application",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All versions prior to version 4107600010.23"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNPROTECTED STORAGE OF CREDENTIALS CWE-256"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7515",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-17T02:52:00.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17909
Vulnerability from cvelistv5
Published
2018-11-05 23:00
Modified
2024-09-16 20:58
Severity ?
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.
References
Impacted products
Vendor Product Version
Omron CX-Supervisor Version: Versions 3.4.1.0 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:01:14.713Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
          },
          {
            "name": "105691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "Omron",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.4.1.0 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "USE AFTER FREE CWE-416",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-06T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
        },
        {
          "name": "105691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-10-17T00:00:00",
          "ID": "CVE-2018-17909",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.4.1.0 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE AFTER FREE CWE-416"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
            },
            {
              "name": "105691",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-17909",
    "datePublished": "2018-11-05T23:00:00Z",
    "dateReserved": "2018-10-02T00:00:00",
    "dateUpdated": "2024-09-16T20:58:29.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19019
Vulnerability from cvelistv5
Published
2019-01-22 20:00
Modified
2024-09-17 01:16
Severity ?
Summary
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106654",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106654"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-23T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106654",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106654"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19019",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106654",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106654"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19019",
    "datePublished": "2019-01-22T20:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-17T01:16:24.999Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19020
Vulnerability from cvelistv5
Published
2019-02-12 22:00
Modified
2024-09-17 03:27
Severity ?
Summary
When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.827Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "OUT-OF-BOUNDS READ CWE-125",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-12T21:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19020",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "OUT-OF-BOUNDS READ CWE-125"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19020",
    "datePublished": "2019-02-12T22:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-17T03:27:41.239Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17907
Vulnerability from cvelistv5
Published
2018-11-05 23:00
Modified
2024-09-17 00:35
Severity ?
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
References
Impacted products
Vendor Product Version
Omron CX-Supervisor Version: Versions 3.4.1.0 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:01:14.673Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
          },
          {
            "name": "105691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "Omron",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.4.1.0 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-06T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
        },
        {
          "name": "105691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-10-17T00:00:00",
          "ID": "CVE-2018-17907",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.4.1.0 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
            },
            {
              "name": "105691",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-17907",
    "datePublished": "2018-11-05T23:00:00Z",
    "dateReserved": "2018-10-02T00:00:00",
    "dateUpdated": "2024-09-17T00:35:43.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7519
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-16 18:13
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.264Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "HEAP-BASED BUFFER OVERFLOW CWE-122",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7519",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "HEAP-BASED BUFFER OVERFLOW CWE-122"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7519",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T18:13:44.973Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7525
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-16 20:21
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.350Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-822",
              "description": "UNTRUSTED POINTER DEREFERENCE CWE-822",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7525",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNTRUSTED POINTER DEREFERENCE CWE-822"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7525",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T20:21:41.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7513
Vulnerability from cvelistv5
Published
2018-03-21 20:00
Modified
2024-09-17 02:42
Severity ?
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-Supervisor Version: Version 3.30 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "103394",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103394"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.30 and prior"
            }
          ]
        }
      ],
      "datePublic": "2018-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "STACK-BASED BUFFER OVERFLOW CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-02T20:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "103394",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103394"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-03-13T00:00:00",
          "ID": "CVE-2018-7513",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Version 3.30 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "STACK-BASED BUFFER OVERFLOW CWE-121"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "103394",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103394"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7513",
    "datePublished": "2018-03-21T20:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-17T02:42:59.350Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-17905
Vulnerability from cvelistv5
Published
2018-11-05 23:00
Modified
2024-09-16 22:29
Severity ?
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.
References
Impacted products
Vendor Product Version
Omron CX-Supervisor Version: Versions 3.4.1.0 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:01:14.601Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
          },
          {
            "name": "105691",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/105691"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "Omron",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.4.1.0 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-10-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-11-06T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
        },
        {
          "name": "105691",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/105691"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-10-17T00:00:00",
          "ID": "CVE-2018-17905",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.4.1.0 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
            },
            {
              "name": "105691",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/105691"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-17905",
    "datePublished": "2018-11-05T23:00:00Z",
    "dateReserved": "2018-10-02T00:00:00",
    "dateUpdated": "2024-09-16T22:29:44.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19018
Vulnerability from cvelistv5
Published
2019-02-12 22:00
Modified
2024-09-16 20:32
Severity ?
Summary
An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.584Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-824",
              "description": "ACCESS OF UNINITIALIZED POINTER CWE-824",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-12T21:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19018",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "ACCESS OF UNINITIALIZED POINTER CWE-824"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19018",
    "datePublished": "2019-02-12T22:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-16T20:32:03.769Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19013
Vulnerability from cvelistv5
Published
2019-01-22 20:00
Modified
2024-09-16 19:40
Severity ?
Summary
An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.924Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106654",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106654"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-23T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106654",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106654"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19013",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106654",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106654"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19013",
    "datePublished": "2019-01-22T20:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-16T19:40:40.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19015
Vulnerability from cvelistv5
Published
2019-01-28 19:00
Modified
2024-09-16 17:03
Severity ?
Summary
An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.820Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106654",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106654"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-29T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106654",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106654"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19015",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND (\u0027COMMAND INJECTION\u0027) CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106654",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106654"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19015",
    "datePublished": "2019-01-28T19:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-16T17:03:35.726Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19017
Vulnerability from cvelistv5
Published
2019-01-22 20:00
Modified
2024-09-17 01:00
Severity ?
Summary
Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
ICS-CERT CX-Supervisor Version: Versions 3.42 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.580Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106654",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106654"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Supervisor",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "Versions 3.42 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "USE AFTER FREE CWE-416",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-23T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106654",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106654"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-17T00:00:00",
          "ID": "CVE-2018-19017",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Supervisor",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions 3.42 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "USE AFTER FREE CWE-416"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106654",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106654"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19017",
    "datePublished": "2019-01-22T20:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-17T01:00:42.376Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-01-22 20:29
Modified
2024-11-21 03:57
Summary
A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de confusi\u00f3n de tipo cuando se procesan archivos de proyecto en CX-Supervisor, en sus versiones 3.42 y anteriores. Un atacante podr\u00eda usar un archivo de proyecto especialmente manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19019",
  "lastModified": "2024-11-21T03:57:10.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-22T20:29:01.190",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-704"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-05 23:29
Modified
2024-11-21 03:55
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC21074-40EC-4804-AA0F-D9D6420E8AC1",
              "versionEndIncluding": "3.4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application."
    },
    {
      "lang": "es",
      "value": "Al procesar archivos de proyecto en Omron CX-Supervisor en versiones 3.4.1.0 y anteriores, la aplicaci\u00f3n no comprueba si est\u00e1 referenciando memoria liberada, lo que podr\u00eda permitir que un atacante ejecute c\u00f3digo bajo el contexto de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-17909",
  "lastModified": "2024-11-21T03:55:11.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-05T23:29:00.317",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-01-22 20:29
Modified
2024-11-21 03:57
Summary
Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "Se han identificado varias vulnerabilidades de uso de memoria previamente liberada en CX-Supervisor, en sus versiones 3.42 y anteriores. Cuando se procesan archivos de proyecto, la aplicaci\u00f3n no comprueba correctamente si est\u00e1 referenciando memoria liberada. Un atacante podr\u00eda usar un archivo de proyecto especialmente manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19017",
  "lastModified": "2024-11-21T03:57:10.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-22T20:29:00.893",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-01-22 20:29
Modified
2024-11-21 03:57
Summary
CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "CX-Supervisor, en sus versiones 3.42 y anteriores, puede ejecutar c\u00f3digo que se ha inyectado en un archivo de proyecto. Un atacante podr\u00eda explotar esto para ejecutar c\u00f3digo arbitrario con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19011",
  "lastModified": "2024-11-21T03:57:09.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-22T20:29:00.410",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, se pueden explotar vulnerabilidades de uso de memoria previamente liberada cuando CX Supervisor analiza un archivo de proyecto especialmente manipulado."
    }
  ],
  "id": "CVE-2018-7521",
  "lastModified": "2024-11-21T04:12:17.387",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.293",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-05 23:29
Modified
2024-11-21 03:55
Summary
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC21074-40EC-4804-AA0F-D9D6420E8AC1",
              "versionEndIncluding": "3.4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de confusi\u00f3n de tipos al procesar archivos de proyecto en Omron CX-Supervisor en versiones 3.4.1.0 y anteriores, lo que podr\u00eda permitir que un atacante ejecute c\u00f3digo en el contexto de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-17913",
  "lastModified": "2024-11-21T03:55:11.767",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-05T23:29:00.347",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-704"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-704"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, se puede explotan vulnerabilidades de acceso de puntero no inicializado cuando CX-Supervisor llama de forma indirecta a un puntero no inicializado al analizar paquetes mal formados."
    }
  ],
  "id": "CVE-2018-7515",
  "lastModified": "2024-11-21T04:12:16.737",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.137",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-256"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-824"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-05 23:29
Modified
2024-11-21 03:55
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC21074-40EC-4804-AA0F-D9D6420E8AC1",
              "versionEndIncluding": "3.4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array."
    },
    {
      "lang": "es",
      "value": "Al procesar archivos de proyecto Omron CX-Supervisor en versiones 3.4.1.0 y anteriores y falsificando el valor de un desplazamiento, un atacante puede forzar a la aplicaci\u00f3n para que lea un valor fuera de un array."
    }
  ],
  "id": "CVE-2018-17907",
  "lastModified": "2024-11-21T03:55:11.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-05T23:29:00.270",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-01-22 20:29
Modified
2024-11-21 03:57
Summary
An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file."
    },
    {
      "lang": "es",
      "value": "Un atacante podr\u00eda inyectar comandos para eliminar archivos y/o borrar el contenido de un archivo en CX-Supervisor, en sus versiones 3.42 y anteriores, mediante un archivo de proyecto especialmente manipulado."
    }
  ],
  "id": "CVE-2018-19013",
  "lastModified": "2024-11-21T03:57:09.967",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-22T20:29:00.660",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, el an\u00e1lisis de archivos de proyecto mal formados puede provocar una vulnerabilidad de doble liberaci\u00f3n (double free)."
    }
  ],
  "id": "CVE-2018-7523",
  "lastModified": "2024-11-21T04:12:17.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.340",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-10-19 03:15
Modified
2024-11-21 05:47
Summary
Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files.
Impacted products
Vendor Product Version
omron cx-supervisor 4.0.0.13
omron cx-supervisor 4.0.0.16



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:4.0.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "475F2663-8F90-4532-9C3F-3B37FDC96811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:4.0.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "482A7868-077A-4E8F-AB9A-D8864FC55C12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de lectura fuera de l\u00edmites en CX-Supervisor versiones v4.0.0.13 y v4.0.0.16, permite a un atacante con privilegios administrativos causar una divulgaci\u00f3n de informaci\u00f3n y/o la ejecuci\u00f3n de c\u00f3digo arbitrario al abrir un archivo de proyecto SCS especialmente dise\u00f1ado"
    }
  ],
  "id": "CVE-2021-20836",
  "lastModified": "2024-11-21T05:47:15.203",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-19T03:15:06.887",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU90041391/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU90041391/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-01-28 19:29
Modified
2024-11-21 03:57
Summary
An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "Un atacante podr\u00eda inyectar comandos para ejecutar programas y crear, escribir y leer archivos en CX-Supervisor, en sus versiones 3.42 y anteriores, mediante un archivo de proyecto especialmente manipulado. Un atacante podr\u00eda explotar esto para ejecutar c\u00f3digo arbitrario con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19015",
  "lastModified": "2024-11-21T03:57:10.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-28T19:29:00.287",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, el procesamiento de un paquete mal formado por parte de cierto ejecutable puede provocar una vulnerabilidad de desreferencia de puntero no fiable."
    }
  ],
  "id": "CVE-2018-7525",
  "lastModified": "2024-11-21T04:12:17.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.387",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-822"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, el an\u00e1lisis de archivos de proyecto mal formados puede provocar un desbordamiento de b\u00fafer basado en pila."
    }
  ],
  "id": "CVE-2018-7513",
  "lastModified": "2024-11-21T04:12:16.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.090",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-12 22:29
Modified
2024-11-21 03:57
Summary
An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
ics-cert@hq.dhs.govhttps://ics-cert.us-cert.gov/advisories/ICSA-19-017-01Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01Mitigation, Third Party Advisory, US Government Resource
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de acceso de puntero no inicializado en CX-Supervisor (versiones 3.42 y anteriores) podr\u00eda conducir a una confusi\u00f3n de tipos al procesar archivos de proyecto. Un atacante podr\u00eda emplear un archivo de proyecto especialmente manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19018",
  "lastModified": "2024-11-21T03:57:10.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-12T22:29:00.343",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-824"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-824"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-26 00:15
Modified
2024-11-21 04:32
Summary
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.
Impacted products
Vendor Product Version
omron cx-supervisor *
teamviewer teamviewer 5.0.8703_qs



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62056105-4D13-4A0C-B55A-B7012B71CB39",
              "versionEndIncluding": "3.5\\(12\\)",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:teamviewer:teamviewer:5.0.8703_qs:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC8FCCA2-8288-4CB6-B8FA-5E54299C5F6D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "AND"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit."
    },
    {
      "lang": "es",
      "value": "En Omron CX-Supervisor, versiones 3.5 (12) y anteriores, Omron CX-Supervisor entregada con Teamviewer versi\u00f3n 5.0.8703 QS. Esta versi\u00f3n de Teamviewer es susceptible a una vulnerabilidad de funci\u00f3n obsoleta que requiere la interacci\u00f3n del usuario para explotar."
    }
  ],
  "id": "CVE-2019-18251",
  "lastModified": "2024-11-21T04:32:55.383",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-26T00:15:11.857",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-19-997/"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-477"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-12 22:29
Modified
2024-11-21 03:57
Summary
When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array.
References
ics-cert@hq.dhs.govhttps://ics-cert.us-cert.gov/advisories/ICSA-19-017-01Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01Mitigation, Third Party Advisory, US Government Resource
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DD1E81-F104-4B6B-B6C5-3F84E33E31BF",
              "versionEndIncluding": "3.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array."
    },
    {
      "lang": "es",
      "value": "Cuando CX-Supervisor (versiones 3.42 y anteriores) procesa archivos de proyecto y manipula el valor de un desplazamiento, un array puede forzar a la aplicaci\u00f3n para que lea un valor fuera de un array."
    }
  ],
  "id": "CVE-2018-19020",
  "lastModified": "2024-11-21T03:57:10.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-12T22:29:00.407",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, el an\u00e1lisis de archivos de proyecto mal formados puede provocar una vulnerabilidad fuera de l\u00edmites."
    }
  ],
  "id": "CVE-2018-7517",
  "lastModified": "2024-11-21T04:12:16.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.200",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-21 20:29
Modified
2024-11-21 04:12
Summary
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.
References
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB019243-8736-41A8-BD0B-6FB8A1B00295",
              "versionEndIncluding": "3.30",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "En las versiones 3.30 y anteriores de Omron CX-Supervisor, el an\u00e1lisis de archivos de proyecto mal formados puede provocar un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)."
    }
  ],
  "id": "CVE-2018-7519",
  "lastModified": "2024-11-21T04:12:17.167",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-21T20:29:01.247",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103394"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-05 23:29
Modified
2024-11-21 03:55
Summary
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.
Impacted products
Vendor Product Version
omron cx-supervisor *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC21074-40EC-4804-AA0F-D9D6420E8AC1",
              "versionEndIncluding": "3.4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object."
    },
    {
      "lang": "es",
      "value": "Al procesar archivos de proyecto en Omron CX-Supervisor en versiones 3.4.1.0 y anteriores y falsificando un byte en concreto, podr\u00eda ocurrir una corrupci\u00f3n de memoria en un objeto espec\u00edfico."
    }
  ],
  "id": "CVE-2018-17905",
  "lastModified": "2024-11-21T03:55:10.790",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-05T23:29:00.223",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201901-0855
Vulnerability from variot

A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A code-injection vulnerability 2. Multiple command-injection vulnerability 3. Omron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 1.4,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.5.0.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2018-19019",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-19019",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2019-14546",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "c5e8c975-1e82-4298-9d14-3378112bcc09",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-129636",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19019",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.3,
            "id": "CVE-2018-19019",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19019",
            "trust": 1.4,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19019",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-14546",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-740",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "c5e8c975-1e82-4298-9d14-3378112bcc09",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129636",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "A type confusion vulnerability exists when processing project files in CX-Supervisor (Versions 3.42 and prior). An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A code-injection vulnerability\n2. Multiple command-injection vulnerability\n3. \nOmron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19019",
        "trust": 5.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "106654",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6715",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6686",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "C5E8C975-1E82-4298-9D14-3378112BCC09",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      }
    ]
  },
  "id": "VAR-201901-0855",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:50.654000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron CX-Supervisor Type Confusion Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/161437"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-704",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-843",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/106654"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-119"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-119",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-175",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129636",
        "ident": null
      },
      {
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19019",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-05-16T00:00:00",
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-119",
        "ident": null
      },
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-175",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14546",
        "ident": null
      },
      {
        "date": "2019-01-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129636",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-740",
        "ident": null
      },
      {
        "date": "2019-01-22T20:29:01.190000",
        "db": "NVD",
        "id": "CVE-2018-19019",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-119",
        "ident": null
      },
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-175",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14546",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129636",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-740",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:10.737000",
        "db": "NVD",
        "id": "CVE-2018-19019",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor Type Confusion Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14546"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "c5e8c975-1e82-4298-9d14-3378112bcc09"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-740"
      }
    ],
    "trust": 0.8
  }
}

var-201902-0643
Vulnerability from variot

An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS files. The issue results from the lack of proper initialization of a pointer prior to accessing it. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A security vulnerability exists in Omron CX-Supervisor 3.42 and earlier

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-19018",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2018-19018",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "VHN-129635",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.3,
            "id": "CVE-2018-19018",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19018",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19018",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19018",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201902-510",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129635",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "An access of uninitialized pointer vulnerability in CX-Supervisor (Versions 3.42 and prior) could lead to type confusion when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS files. The issue results from the lack of proper initialization of a pointer prior to accessing it. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A security vulnerability exists in Omron CX-Supervisor 3.42 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19018",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6717",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-174",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      }
    ]
  },
  "id": "VAR-201902-0643",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      }
    ],
    "trust": 0.6707546999999999
  },
  "last_update_date": "2024-11-23T22:21:50.701000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Omron CX-Supervisor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89321"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-824",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-19-174",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129635",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19018",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-174",
        "ident": null
      },
      {
        "date": "2019-02-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129635",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-510",
        "ident": null
      },
      {
        "date": "2019-02-12T22:29:00.343000",
        "db": "NVD",
        "id": "CVE-2018-19018",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-174",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129635",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-510",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:10.610000",
        "db": "NVD",
        "id": "CVE-2018-19018",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-510"
      }
    ],
    "trust": 0.6
  }
}

var-201803-2214
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 ∙ Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. There is a free use vulnerability in the Omron CX-Supervisor 3.30 version. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 6.3,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      }
    ],
    "trust": 3.5
  },
  "cve": "CVE-2018-7521",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7521",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 3.5,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7521",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05316",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137553",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7521",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.1,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7521",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.0,
            "id": "CVE-2018-7521",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7521",
            "trust": 3.5,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7521",
            "trust": 2.1,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7521",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7521",
            "trust": 0.7,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05316",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-652",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137553",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 \u2219 Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. There is a free use vulnerability in the Omron CX-Supervisor 3.30 version. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      }
    ],
    "trust": 8.37
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7521",
        "trust": 9.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6687",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5306",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6711",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5300",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5308",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5304",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5307",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6663",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6691",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E65ED2-39AB-11E9-A8DD-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      }
    ]
  },
  "id": "VAR-201803-2214",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.567000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 6.3,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "Omron CX-Supervisor free use of vulnerable patches",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121533"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79271"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 9.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1352",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-255",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05316",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137553",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7521",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1352",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-257",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1354",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-251",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-259",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-255",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-258",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1351",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1353",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05316",
        "ident": null
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137553",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-652",
        "ident": null
      },
      {
        "date": "2018-03-21T20:29:01.293000",
        "db": "NVD",
        "id": "CVE-2018-7521",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1352",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-257",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1354",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-251",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-259",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-255",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-258",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1351",
        "ident": null
      },
      {
        "date": "2018-11-21T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1353",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05316",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137553",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-652",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:17.387000",
        "db": "NVD",
        "id": "CVE-2018-7521",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1352"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-257"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1354"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-251"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-259"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-258"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1351"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1353"
      }
    ],
    "trust": 5.6
  },
  "type": {
    "_id": null,
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e65ed2-39ab-11e9-a8dd-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-652"
      }
    ],
    "trust": 0.8
  }
}

var-201901-0849
Vulnerability from variot

CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Command injection (CWE-77) - CVE-2018-19013 By processing a specially crafted project file, files on the device and their contents are deleted. * Command injection (CWE-77) - CVE-2018-19015 By processing a specially crafted project file, the program is executed with the authority of the application, and a file on the device is created, written and read. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Out-of-bounds Read ( Read out of bounds ) (CWE-125) - CVE-2018-19020 By processing a specially crafted project file, the application reads values outside the array.Service disruption by a third party (DoS) An attacker could be attacked or execute arbitrary code with application privileges. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A code-injection vulnerability 2. Multiple command-injection vulnerability 3. Omron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201901-0849",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.42"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.5.0.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-19011",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-19011",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2019-14549",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "451797bd-6e00-4053-8f07-fb66ecf9af70",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-129628",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-19011",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19011",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19011",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19011",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-14549",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-736",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "451797bd-6e00-4053-8f07-fb66ecf9af70",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129628",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CX-Supervisor (Versions 3.42 and prior) can execute code that has been injected into a project file. An attacker could exploit this to execute code under the privileges of the application. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Command injection (CWE-77) - CVE-2018-19013 By processing a specially crafted project file, files on the device and their contents are deleted. * Command injection (CWE-77) - CVE-2018-19015 By processing a specially crafted project file, the program is executed with the authority of the application, and a file on the device is created, written and read. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Out-of-bounds Read ( Read out of bounds ) (CWE-125) - CVE-2018-19020 By processing a specially crafted project file, the application reads values outside the array.Service disruption by a third party (DoS) An attacker could be attacked or execute arbitrary code with application privileges. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A code-injection vulnerability\n2. Multiple command-injection vulnerability\n3. \nOmron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19011",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "106654",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6645",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "451797BD-6E00-4053-8F07-FB66ECF9AF70",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "id": "VAR-201901-0849",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:50.609000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Omron CX-Supervisor code injection vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/161431"
      },
      {
        "title": "Omron CX-Supervisor Fixes for code injection vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89507"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-77",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/106654"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-16T00:00:00",
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "date": "2019-01-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654"
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "date": "2019-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "date": "2019-01-22T20:29:00.410000",
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-100"
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129628"
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654"
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      },
      {
        "date": "2024-11-21T03:57:09.707000",
        "db": "NVD",
        "id": "CVE-2018-19011"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Omron CX-Supervisor Code injection vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14549"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code injection",
    "sources": [
      {
        "db": "IVD",
        "id": "451797bd-6e00-4053-8f07-fb66ecf9af70"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-736"
      }
    ],
    "trust": 0.8
  }
}

var-202110-0968
Vulnerability from variot

Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files. Provided by OMRON Corporation CX-Supervisor Is a memory reference outside the area ( CWE-125 , CVE-2021-20836 ) Vulnerability exists. The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202110-0968",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.0.0.13"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.0.0.16"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": "v4.0.0.13"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": "v4.0.0.16"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
        "version": "also,  is a product sold only outside japan."
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "cve": "CVE-2021-20836",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2021-20836",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "VHN-378512",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.6,
            "id": "CVE-2021-20836",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 6.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-003080",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-20836",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2021-003080",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202110-1213",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-378512",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-20836",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Out-of-bounds read vulnerability in CX-Supervisor v4.0.0.13 and v4.0.0.16 allows an attacker with administrative privileges to cause information disclosure and/or arbitrary code execution by opening a specially crafted SCS project files. Provided by OMRON Corporation CX-Supervisor Is a memory reference outside the area ( CWE-125 , CVE-2021-20836 ) Vulnerability exists. The following is the vulnerability information JPCERT/CC Report to JPCERT/CC Coordinated with the developers",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVNVU90041391",
        "trust": 2.6
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-378512",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "id": "VAR-202110-0968",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      }
    ],
    "trust": 0.6707546999999999
  },
  "last_update_date": "2024-08-14T15:37:52.499000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release\u00a0Notes\u00a0For\u00a0CX-Supervisor\u00a04.1.1.2 OMRON Corporation",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=167088"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.1
      },
      {
        "problemtype": "Out-of-bounds read (CWE-125) [ Other ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://jvn.jp/en/vu/jvnvu90041391/index.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1692"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90041391/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20836"
      },
      {
        "trust": 0.6,
        "url": "https://jvndb.jvn.jp/en/contents/2021/jvndb-2021-003080.html"
      },
      {
        "trust": 0.1,
        "url": "https://www.myomron.com/index.php?action=kb\u0026amp;article=1692"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/125.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-10-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "date": "2021-10-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "date": "2021-10-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "date": "2021-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "date": "2021-10-19T03:15:06.887000",
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-10-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-378512"
      },
      {
        "date": "2021-10-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-20836"
      },
      {
        "date": "2021-11-01T06:34:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      },
      {
        "date": "2021-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      },
      {
        "date": "2021-10-22T17:02:14.547000",
        "db": "NVD",
        "id": "CVE-2021-20836"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Made by OMRON \u00a0CX-Supervisor\u00a0 Out-of-bounds memory reference vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-003080"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1213"
      }
    ],
    "trust": 0.6
  }
}

var-201803-2211
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 ∙ Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 ∙ A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. An out-of-bounds read vulnerability exists in Omron CX-Supervisor 3.30 and earlier versions

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7517",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7517",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7517",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05317",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137549",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7517",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7517",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7517",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05317",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-655",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137549",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 \u2219 Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 \u2219 A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. An out-of-bounds read vulnerability exists in Omron CX-Supervisor 3.30 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7517",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5305",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E685E1-39AB-11E9-8C9E-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      }
    ]
  },
  "id": "VAR-201803-2211",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.792000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Omron CX-Supervisor patch across the boundary to write vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121531"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79274"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-256"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-256",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137549",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7517",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-256",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05317",
        "ident": null
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137549",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-655",
        "ident": null
      },
      {
        "date": "2018-03-21T20:29:01.200000",
        "db": "NVD",
        "id": "CVE-2018-7517",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-256",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05317",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137549",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-655",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:16.950000",
        "db": "NVD",
        "id": "CVE-2018-7517",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor Cross-border write vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05317"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e1-39ab-11e9-8c9e-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-655"
      }
    ],
    "trust": 0.8
  }
}

var-201811-0100
Vulnerability from variot

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907  Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. By manipulating a document's elements an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. The Omron CX-Supervisor is a visual machine controller from Omron, Japan. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. Multiple remote code-execution vulnerabilities 2. A memory-corruption vulnerability 3

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 2.1,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "b0nd @garage4hackers",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2018-17907",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-17907",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 2.4,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 4.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 1.6,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.9,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-17907",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 1.2,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 1.9,
            "id": "CNVD-2018-21479",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 1.2,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 1.9,
            "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-128413",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 4.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17907",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.0,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.5,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-17907",
            "trust": 2.1,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-17907",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21479",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1024",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "IVD",
            "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1",
            "trust": 0.2,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128413",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907 \uf0b7 Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. By manipulating a document\u0027s elements an attacker can trigger a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. The Omron CX-Supervisor is a visual machine controller from Omron, Japan. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. Multiple remote code-execution vulnerabilities\n2. A memory-corruption vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      }
    ],
    "trust": 4.59
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17907",
        "trust": 5.7
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-290-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "105691",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99213938",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6419",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6427",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6404",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2FE53A1-39AB-11E9-AF12-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      }
    ]
  },
  "id": "VAR-201811-0100",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:38:03.068000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 2.1,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.4.2",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?article=1709\u0026action=kb"
      },
      {
        "title": "Omron CX-Supervisor patch for out-of-bounds read vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/142863"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86088"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-119",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-290-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105691"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17913"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-18-290-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu99213938/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17913"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1285"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1285",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1280",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1288",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21479",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-128413",
        "ident": null
      },
      {
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17907",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-23T00:00:00",
        "db": "IVD",
        "id": "e2fe53a1-39ab-11e9-af12-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1285",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1280",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1288",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21479",
        "ident": null
      },
      {
        "date": "2018-11-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128413",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1024",
        "ident": null
      },
      {
        "date": "2018-11-05T23:29:00.270000",
        "db": "NVD",
        "id": "CVE-2018-17907",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1285",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1280",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1288",
        "ident": null
      },
      {
        "date": "2018-10-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21479",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128413",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2019-07-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1024",
        "ident": null
      },
      {
        "date": "2024-11-21T03:55:11.030000",
        "db": "NVD",
        "id": "CVE-2018-17907",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1024"
      }
    ],
    "trust": 0.6
  }
}

var-201902-0644
Vulnerability from variot

When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Command injection (CWE-77) - CVE-2018-19013 By processing a specially crafted project file, files on the device and their contents are deleted. * Command injection (CWE-77) - CVE-2018-19015 By processing a specially crafted project file, the program is executed with the authority of the application, and a file on the device is created, written and read. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A security vulnerability exists in Omron CX-Supervisor 3.42 and earlier

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Michael DePlante of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-19020",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2018-19020",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "VHN-129638",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.3,
            "id": "CVE-2018-19020",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19020",
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19020",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19020",
            "trust": 0.7,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201902-511",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129638",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "When CX-Supervisor (Versions 3.42 and prior) processes project files and tampers with the value of an offset, an attacker can force the application to read a value outside of an array. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Command injection (CWE-77) - CVE-2018-19013 By processing a specially crafted project file, files on the device and their contents are deleted. * Command injection (CWE-77) - CVE-2018-19015 By processing a specially crafted project file, the program is executed with the authority of the application, and a file on the device is created, written and read. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A security vulnerability exists in Omron CX-Supervisor 3.42 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19020",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-7464",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-173",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      }
    ]
  },
  "id": "VAR-201902-0644",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      }
    ],
    "trust": 0.6707546999999999
  },
  "last_update_date": "2024-11-23T22:21:50.945000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Omron CX-Supervisor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89322"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-125",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.2,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-19-173",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129638",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19020",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-173",
        "ident": null
      },
      {
        "date": "2019-02-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129638",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-02-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-511",
        "ident": null
      },
      {
        "date": "2019-02-12T22:29:00.407000",
        "db": "NVD",
        "id": "CVE-2018-19020",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-173",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129638",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201902-511",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:10.860000",
        "db": "NVD",
        "id": "CVE-2018-19020",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201902-511"
      }
    ],
    "trust": 0.6
  }
}

var-201803-2208
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. A buffer overflow vulnerability exists in Omron CX-Supervisor 3.30 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7513",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7513",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7513",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05313",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e610b1-39ab-11e9-a998-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137545",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7513",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7513",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7513",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05313",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-651",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e610b1-39ab-11e9-a998-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137545",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. A buffer overflow vulnerability exists in Omron CX-Supervisor 3.30 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7513",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5299",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E610B1-39AB-11E9-A998-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      }
    ]
  },
  "id": "VAR-201803-2208",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.517000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Patch for Omron CX-Supervisor Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121525"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79270"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-250"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-250",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137545",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7513",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-250",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05313",
        "ident": null
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137545",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-651",
        "ident": null
      },
      {
        "date": "2018-03-21T20:29:01.090000",
        "db": "NVD",
        "id": "CVE-2018-7513",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-250",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05313",
        "ident": null
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137545",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-651",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:16.530000",
        "db": "NVD",
        "id": "CVE-2018-7513",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05313"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e610b1-39ab-11e9-a998-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-651"
      }
    ],
    "trust": 0.8
  }
}

var-201811-0098
Vulnerability from variot

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907  Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. Multiple remote code-execution vulnerabilities 2. A memory-corruption vulnerability 3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A buffer error vulnerability exists in Omron CX-Supervisor 3.4.1.0 and earlier

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "b0nd @garage4hackers",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-17905",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-17905",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.7,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 4.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 1.6,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.9,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-128411",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 4.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17905",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.0,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.5,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-17905",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17905",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1023",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128411",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Buffer overflow (CWE-119) - CVE-2018-17905 Processing a specially crafted project file causes memory corruption * * Read out of bounds (CWE-125) - CVE-2018-17907 \uf0b7 Reading out-of-array values by processing a specially crafted project file * * Use of freed memory (Use-after-free) (CWE-416) - CVE-2018-17909 Processing arbitrary crafted project files results in arbitrary code execution * * Bad type conversion or cast (Incorrect Type Conversion or Cast) (CWE-704) - CVE-2018-17913 Processing arbitrary crafted project files results in arbitrary code executionA remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. Multiple remote code-execution vulnerabilities\n2. A memory-corruption vulnerability\n3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A buffer error vulnerability exists in Omron CX-Supervisor 3.4.1.0 and earlier",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17905",
        "trust": 3.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-290-01",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "105691",
        "trust": 2.0
      },
      {
        "db": "JVN",
        "id": "JVNVU99213938",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6401",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1287",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      }
    ]
  },
  "id": "VAR-201811-0098",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      }
    ],
    "trust": 0.6707546999999999
  },
  "last_update_date": "2024-11-23T21:38:03.120000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.2",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?article=1709\u0026action=kb"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86087"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-290-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105691"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17913"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-18-290-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu99213938/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17913"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1287",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-128411",
        "ident": null
      },
      {
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17905",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1287",
        "ident": null
      },
      {
        "date": "2018-11-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128411",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1023",
        "ident": null
      },
      {
        "date": "2018-11-05T23:29:00.223000",
        "db": "NVD",
        "id": "CVE-2018-17905",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1287",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128411",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2019-07-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1023",
        "ident": null
      },
      {
        "date": "2024-11-21T03:55:10.790000",
        "db": "NVD",
        "id": "CVE-2018-17905",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1023"
      }
    ],
    "trust": 0.6
  }
}

var-201911-1039
Vulnerability from variot

In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit. Omron CX-Supervisor and Teamviewer Has unspecified vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of OMRON CX-Supervisor. The issue results from the use of an outdated version of Teamviewer containing known vulnerabilities. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Supervisor is a visual machine controller from Japan's Omron.

CX-Supervisor has an unknown vulnerability, which can be used by an attacker to cause information leakage, comprehensive damage to the system, and denial of service. TeamViewer is a set of software for remote control, desktop sharing and file transfer of German TeamViewer company

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "teamviewer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "teamviewer",
        "version": "5.0.8703_qs"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.5\\(12\\)"
      },
      {
        "_id": null,
        "model": "teamviewer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "teamviewer",
        "version": "5.0.8703 qs"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "3.5 (12)"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.5(12)"
      },
      {
        "_id": null,
        "model": null,
        "scope": "lte",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "\u003c=3.5(12)"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:teamviewer:teamviewer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Michael DePlante",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      }
    ],
    "trust": 1.3
  },
  "cve": "CVE-2019-18251",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2019-18251",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-42429",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "72b943a0-4d32-4f39-8090-625814291929",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-150579",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-18251",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2019-18251",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2019-18251",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-18251",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-18251",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2019-18251",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-42429",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201911-999",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "72b943a0-4d32-4f39-8090-625814291929",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-150579",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2019-18251",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit. Omron CX-Supervisor and Teamviewer Has unspecified vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of OMRON CX-Supervisor. The issue results from the use of an outdated version of Teamviewer containing known vulnerabilities. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-Supervisor is a visual machine controller from Japan\u0027s Omron. \n\nCX-Supervisor has an unknown vulnerability, which can be used by an attacker to cause information leakage, comprehensive damage to the system, and denial of service. TeamViewer is a set of software for remote control, desktop sharing and file transfer of German TeamViewer company",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251"
      }
    ],
    "trust": 3.15
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-18251",
        "trust": 4.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997",
        "trust": 3.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-318-04",
        "trust": 3.2
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-9313",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4729",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.4314",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "47528",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "72B943A0-4D32-4F39-8090-625814291929",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      }
    ]
  },
  "id": "VAR-201911-1039",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:33:39.414000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": " https://www.teamviewer.com/ja/ "
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
      },
      {
        "title": "Patch for Omron CX-Supervisor has an unknown vulnerability (CNVD-2019-42429)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/192107"
      },
      {
        "title": "Omron CX-Supervisor Teamviewer Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103868"
      },
      {
        "title": "nvd_scrapper",
        "trust": 0.1,
        "url": "https://github.com/abhav/nvd_scrapper "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-477",
        "trust": 1.0
      },
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.9,
        "url": "https://www.us-cert.gov/ics/advisories/icsa-19-318-04"
      },
      {
        "trust": 2.6,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-19-997/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18251"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18251"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4729/"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/47528"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.4314/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/171553"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/abhav/nvd_scrapper"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-997"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429"
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579"
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-18251"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-997",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-42429",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-150579",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2019-18251",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2019-18251",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-11-27T00:00:00",
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929",
        "ident": null
      },
      {
        "date": "2019-12-09T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-997",
        "ident": null
      },
      {
        "date": "2019-11-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-42429",
        "ident": null
      },
      {
        "date": "2019-11-26T00:00:00",
        "db": "VULHUB",
        "id": "VHN-150579",
        "ident": null
      },
      {
        "date": "2019-11-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-18251",
        "ident": null
      },
      {
        "date": "2019-12-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012792",
        "ident": null
      },
      {
        "date": "2019-11-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-999",
        "ident": null
      },
      {
        "date": "2019-11-26T00:15:11.857000",
        "db": "NVD",
        "id": "CVE-2019-18251",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-12-09T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-997",
        "ident": null
      },
      {
        "date": "2019-11-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-42429",
        "ident": null
      },
      {
        "date": "2019-12-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-150579",
        "ident": null
      },
      {
        "date": "2019-12-11T00:00:00",
        "db": "VULMON",
        "id": "CVE-2019-18251",
        "ident": null
      },
      {
        "date": "2019-12-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-012792",
        "ident": null
      },
      {
        "date": "2020-08-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201911-999",
        "ident": null
      },
      {
        "date": "2024-11-21T04:32:55.383000",
        "db": "NVD",
        "id": "CVE-2019-18251",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor and  Teamviewer Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-012792"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "other",
    "sources": [
      {
        "db": "IVD",
        "id": "72b943a0-4d32-4f39-8090-625814291929"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201911-999"
      }
    ],
    "trust": 0.8
  }
}

var-201901-0851
Vulnerability from variot

An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Out-of-bounds Read ( Read out of bounds ) (CWE-125) - CVE-2018-19020 By processing a specially crafted project file, the application reads values outside the array.Service disruption by a third party (DoS) An attacker could be attacked or execute arbitrary code with application privileges. This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of a user-supplied string, which could allow the deletion of any file on the system. An attacker could use this to delete data or create a denial-of-service condition. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A code-injection vulnerability 2. Multiple command-injection vulnerability 3. Omron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A command injection vulnerability exists in Omron CX-Supervisor 3.42 and earlier versions

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 1.4,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.5.0.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2018-19013",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CVE-2018-19013",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2019-14548",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 6.8,
            "id": "VHN-129630",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19013",
            "impactScore": 4.2,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.3,
            "id": "CVE-2018-19013",
            "impactScore": 3.6,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19013",
            "trust": 1.4,
            "value": "MEDIUM"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19013",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-14548",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-737",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129630",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "An attacker could inject commands to delete files and/or delete the contents of a file on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Out-of-bounds Read ( Read out of bounds ) (CWE-125) - CVE-2018-19020 By processing a specially crafted project file, the application reads values outside the array.Service disruption by a third party (DoS) An attacker could be attacked or execute arbitrary code with application privileges. This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of a user-supplied string, which could allow the deletion of any file on the system. An attacker could use this to delete data or create a denial-of-service condition. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A code-injection vulnerability\n2. Multiple command-injection vulnerability\n3. \nOmron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A command injection vulnerability exists in Omron CX-Supervisor 3.42 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19013",
        "trust": 5.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "106654",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6646",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6662",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "1C7E5B44-5C6B-4AC1-9519-E37DB013737A",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      }
    ]
  },
  "id": "VAR-201901-0851",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:50.814000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron CX-Supervisor command to inject vulnerability patches",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/161433"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-77",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/106654"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-105"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-105",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-102",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129630",
        "ident": null
      },
      {
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19013",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-05-16T00:00:00",
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-105",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-102",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14548",
        "ident": null
      },
      {
        "date": "2019-01-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129630",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-737",
        "ident": null
      },
      {
        "date": "2019-01-22T20:29:00.660000",
        "db": "NVD",
        "id": "CVE-2018-19013",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-105",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-102",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14548",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129630",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-737",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:09.967000",
        "db": "NVD",
        "id": "CVE-2018-19013",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor Command injection vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14548"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "_id": null,
    "data": "Command injection",
    "sources": [
      {
        "db": "IVD",
        "id": "1c7e5b44-5c6b-4ac1-9519-e37db013737a"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-737"
      }
    ],
    "trust": 0.8
  }
}

var-201803-2209
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 ∙ Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 ∙ A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. There is a security vulnerability in the Omron CX-Supervisor 3.30 version. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2209",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-supervisor",
        "scope": null,
        "trust": 1.4,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2018-7515",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7515",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 1.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7515",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05318",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137547",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7515",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7515",
            "trust": 1.4,
            "value": "MEDIUM"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7515",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05318",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-653",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137547",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 \u2219 Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 \u2219 A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. There is a security vulnerability in the Omron CX-Supervisor 3.30 version. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      }
    ],
    "trust": 3.96
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7515",
        "trust": 5.0
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5302",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5301",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E685E2-39AB-11E9-9CC3-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "id": "VAR-201803-2209",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.743000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "Omron CX-Supervisor has an unexplained patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121539"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79272"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-824",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-256",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-476",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e685e2-39ab-11e9-9cc3-000c29342cb1"
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "date": "2018-03-21T20:29:01.137000",
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-253"
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-252"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05318"
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137547"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      },
      {
        "date": "2024-11-21T04:12:16.737000",
        "db": "NVD",
        "id": "CVE-2018-7515"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-653"
      }
    ],
    "trust": 0.6
  }
}

var-201811-0103
Vulnerability from variot

A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. Multiple remote code-execution vulnerabilities 2. A memory-corruption vulnerability 3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 1.4,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Mat Powell of Trend Micro Zero Day Initiative",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-17913",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-17913",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.7,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 4.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 1.6,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.9,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-128420",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 4.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17913",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.0,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.5,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17913",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-17913",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17913",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17913",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1026",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128420",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. Multiple remote code-execution vulnerabilities\n2. A memory-corruption vulnerability\n3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      }
    ],
    "trust": 3.24
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17913",
        "trust": 4.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-290-01",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "105691",
        "trust": 2.0
      },
      {
        "db": "JVN",
        "id": "JVNVU99213938",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6418",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1286",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6612",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      }
    ]
  },
  "id": "VAR-201811-0103",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      }
    ],
    "trust": 0.6707546999999999
  },
  "last_update_date": "2024-11-23T21:38:03.156000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.4.2",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?article=1709\u0026action=kb"
      },
      {
        "title": "Omron CX-Supervisor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86090"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-704",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-290-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105691"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17913"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-18-290-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu99213938/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17913"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1286",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1289",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-128420",
        "ident": null
      },
      {
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17913",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1286",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1289",
        "ident": null
      },
      {
        "date": "2018-11-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128420",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1026",
        "ident": null
      },
      {
        "date": "2018-11-05T23:29:00.347000",
        "db": "NVD",
        "id": "CVE-2018-17913",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1286",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1289",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128420",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2019-07-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1026",
        "ident": null
      },
      {
        "date": "2024-11-21T03:55:11.767000",
        "db": "NVD",
        "id": "CVE-2018-17913",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "code problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1026"
      }
    ],
    "trust": 0.6
  }
}

var-201803-2215
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 ∙ Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 ∙ A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. When parsing a malformed scatter chart object, the process does not properly validate the existence of an object prior to performing operations on it. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2215",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7523",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7523",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7523",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05319",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137555",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7523",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7523",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7523",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05319",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-654",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137555",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 \u2219 Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 \u2219 A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of SCS project files. When parsing a malformed scatter chart object, the process does not properly validate the existence of an object prior to performing operations on it. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7523",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5303",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E6ACEE-39AB-11E9-A49B-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "id": "VAR-201803-2215",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.696000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Omron CX-Supervisor has an unspecified vulnerability (CNVD-2018-05319) patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121541"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79273"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-415",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "date": "2018-03-21T20:29:01.340000",
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-254"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05319"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137555"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      },
      {
        "date": "2024-11-21T04:12:17.610000",
        "db": "NVD",
        "id": "CVE-2018-7523"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acee-39ab-11e9-a49b-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-654"
      }
    ],
    "trust": 0.8
  }
}

var-201803-2212
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of SCS project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7519",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7519",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7519",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05314",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137551",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7519",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7519",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7519",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05314",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-657",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137551",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of SCS project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7519",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5384",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E637C0-39AB-11E9-A2AE-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      }
    ]
  },
  "id": "VAR-201803-2212",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.648000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Omron CX-Supervisor Patch Buffer Overflow Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121529"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79276"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-122",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-261"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-261",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137551",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7519",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-261",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05314",
        "ident": null
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137551",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-657",
        "ident": null
      },
      {
        "date": "2018-03-21T20:29:01.247000",
        "db": "NVD",
        "id": "CVE-2018-7519",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-261",
        "ident": null
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05314",
        "ident": null
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137551",
        "ident": null
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "ident": null
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-657",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:17.167000",
        "db": "NVD",
        "id": "CVE-2018-7519",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-Supervisor Heap Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05314"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e637c0-39ab-11e9-a2ae-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-657"
      }
    ],
    "trust": 0.8
  }
}

var-201901-0853
Vulnerability from variot

An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Code. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A code-injection vulnerability 2. Multiple command-injection vulnerability 3. Omron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A command injection vulnerability exists in Omron CX-Supervisor 3.42 and earlier versions

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 6.3,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.5.0.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      }
    ],
    "trust": 6.3
  },
  "cve": "CVE-2018-19015",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CVE-2018-19015",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "CNVD-2019-14547",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "id": "VHN-129632",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19015",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 6.3,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.3,
            "id": "CVE-2018-19015",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-19015",
            "trust": 6.3,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19015",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-14547",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-738",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129632",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "An attacker could inject commands to launch programs and create, write, and read files on CX-Supervisor (Versions 3.42 and prior) through a specially crafted project file. An attacker could exploit this to execute code under the privileges of the application. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * Code injection (CWE-94) - CVE-2018-19011 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Use After Free ( Use of freed memory ) (CWE-416) - CVE-2018-19017 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Resource Using Incompatible Type ( Mixing of molds ) (CWE-843) - CVE-2018-19019 By processing a specially crafted project file, arbitrary code can be executed with application privileges. * Access of Uninitialized Pointer ( Uninitialized pointer access ) (CWE-824) - CVE-2018-19018 By processing a specially crafted project file, arbitrary code can be executed with application privileges. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Code. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A code-injection vulnerability\n2. Multiple command-injection vulnerability\n3. \nOmron CX-Supervisor 3.42 and prior versions are vulnerable. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan. A command injection vulnerability exists in Omron CX-Supervisor 3.42 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      }
    ],
    "trust": 8.37
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19015",
        "trust": 9.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "106654",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6641",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6643",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6638",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6637",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6636",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6639",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6642",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6647",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6644",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110",
        "trust": 0.7
      },
      {
        "db": "NSFOCUS",
        "id": "42571",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "3D946A2E-2284-4501-9FB2-490C64A6D05C",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      }
    ]
  },
  "id": "VAR-201901-0853",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:50.869000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 6.3,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Patch for Omron CX-Supervisor Command Injection Vulnerability (NVD-C-2019-12033)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/161435"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-77",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-78",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 9.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/106654"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/42571"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-109"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-109",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-111",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-107",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-104",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-106",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-103",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-108",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-101",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-110",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14547",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129632",
        "ident": null
      },
      {
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19015",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-05-16T00:00:00",
        "db": "IVD",
        "id": "3d946a2e-2284-4501-9fb2-490c64a6d05c",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-109",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-111",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-107",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-104",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-106",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-103",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-108",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-101",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-110",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14547",
        "ident": null
      },
      {
        "date": "2019-01-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129632",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-738",
        "ident": null
      },
      {
        "date": "2019-01-28T19:29:00.287000",
        "db": "NVD",
        "id": "CVE-2018-19015",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-109",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-111",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-107",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-104",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-106",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-103",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-108",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-101",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-110",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14547",
        "ident": null
      },
      {
        "date": "2020-09-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129632",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2020-09-21T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-738",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:10.230000",
        "db": "NVD",
        "id": "CVE-2018-19015",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-738"
      }
    ],
    "trust": 0.6
  }
}

var-201901-0854
Vulnerability from variot

Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Program permission execution code. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A code-injection vulnerability 2. Multiple command-injection vulnerability 3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 5.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.42"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.5.0.11"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      }
    ],
    "trust": 5.6
  },
  "cve": "CVE-2018-19017",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.6,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 3.2,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-19017",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 4.5,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:N/I:P/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "Single",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.7,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2019-14545",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "a948638f-7894-4b71-88b6-ea6e2f59f286",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-129634",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19017",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 4.2,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 3.2,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.0,
            "id": "CVE-2018-19017",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-19017",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 5.0,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.8,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001051",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-19017",
            "trust": 4.2,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 3.2,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-19017",
            "trust": 1.4,
            "value": "CRITICAL"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19017",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001051",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-14545",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-739",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "a948638f-7894-4b71-88b6-ea6e2f59f286",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129634",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Several use after free vulnerabilities have been identified in CX-Supervisor (Versions 3.42 and prior). When processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of project files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-Supervisor is a powerful and advanced machine visualization package that provides a very flexible PC-based HMI environment. Program permission execution code. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A code-injection vulnerability\n2. Multiple command-injection vulnerability\n3. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      }
    ],
    "trust": 7.74
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19017",
        "trust": 9.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-017-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "106654",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU90014171",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6698",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6719",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6689",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6696",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6688",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6694",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6693",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6695",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "A948638F-7894-4B71-88B6-EA6E2F59F286",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      }
    ]
  },
  "id": "VAR-201901-0854",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:21:50.738000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 5.6,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.5",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1711"
      },
      {
        "title": "Omron CX-Supervisor releases patches for reusing vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/161439"
      },
      {
        "title": "Omron CX-Supervisor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89506"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 9.0,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-017-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/106654"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19017"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90014171/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19019"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19018"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19020"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19011"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19013"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19015"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19017"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634"
      },
      {
        "db": "BID",
        "id": "106654"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-176",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-14545",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129634",
        "ident": null
      },
      {
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19017",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-05-16T00:00:00",
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286",
        "ident": null
      },
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-176",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-118",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-115",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-113",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-114",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-117",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-112",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-116",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14545",
        "ident": null
      },
      {
        "date": "2019-01-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129634",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-01-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-01-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-739",
        "ident": null
      },
      {
        "date": "2019-01-22T20:29:00.893000",
        "db": "NVD",
        "id": "CVE-2018-19017",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-176",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-118",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-115",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-113",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-114",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-117",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-112",
        "ident": null
      },
      {
        "date": "2019-01-19T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-116",
        "ident": null
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-14545",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129634",
        "ident": null
      },
      {
        "date": "2019-01-17T00:00:00",
        "db": "BID",
        "id": "106654",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001051",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-739",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:10.480000",
        "db": "NVD",
        "id": "CVE-2018-19017",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-176"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-118"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-115"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-113"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-114"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-117"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-112"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-116"
      }
    ],
    "trust": 5.6
  },
  "type": {
    "_id": null,
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "a948638f-7894-4b71-88b6-ea6e2f59f286"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-739"
      }
    ],
    "trust": 0.8
  }
}

var-201811-0101
Vulnerability from variot

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-Supervisor is a visual machine controller from Omron, Japan. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. Multiple remote code-execution vulnerabilities 2. A memory-corruption vulnerability 3. A use-after-free vulnerability exists in Omron CX-Supervisor 3.4.1.0 and earlier versions

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": null,
        "trust": 4.2,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "omron",
        "version": "3.4.1.0"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "_id": null,
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.2"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "b0nd @garage4hackers",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      }
    ],
    "trust": 2.1
  },
  "cve": "CVE-2018-17909",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-17909",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 4.5,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 4.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 1.6,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Complete",
            "baseScore": 6.9,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Local",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 1.9,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 1.9,
            "id": "CNVD-2018-21476",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.7,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 1.9,
            "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.2,
            "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-128415",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 4.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-17909",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 7.0,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "None",
            "baseScore": 2.5,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-008493",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.0,
            "id": "CVE-2018-17909",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-17909",
            "trust": 3.5,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-17909",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-008493",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-17909",
            "trust": 0.7,
            "value": "CRITICAL"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-21476",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201810-1025",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-128415",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of SCS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-Supervisor is a visual machine controller from Omron, Japan. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. Multiple remote code-execution vulnerabilities\n2. A memory-corruption vulnerability\n3. A use-after-free vulnerability exists in Omron CX-Supervisor 3.4.1.0 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      }
    ],
    "trust": 6.48
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-17909",
        "trust": 7.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-290-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "105691",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU99213938",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6403",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6657",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6402",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6446",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6581",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6582",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2FE53A0-39AB-11E9-B9BC-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      }
    ]
  },
  "id": "VAR-201811-0101",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:38:03.001000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 4.2,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-290-01"
      },
      {
        "title": "Release Notes For CX-Supervisor 3.4.2",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?article=1709\u0026action=kb"
      },
      {
        "title": "Omron CX-Supervisor code execution vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/142869"
      },
      {
        "title": "Omron CX-Supervisor Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86089"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-416",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 6.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-290-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/105691"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17913"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "http://www.us-cert.gov/control_systems/pdf/icsa-18-290-01.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu99213938/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17905"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17907"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17909"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17913"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476"
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415"
      },
      {
        "db": "BID",
        "id": "105691"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1283",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1446",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1282",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-21476",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-128415",
        "ident": null
      },
      {
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-17909",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-23T00:00:00",
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1283",
        "ident": null
      },
      {
        "date": "2019-01-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1446",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1284",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1279",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1282",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1281",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21476",
        "ident": null
      },
      {
        "date": "2018-11-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128415",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2018-10-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2018-10-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1025",
        "ident": null
      },
      {
        "date": "2018-11-05T23:29:00.317000",
        "db": "NVD",
        "id": "CVE-2018-17909",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1283",
        "ident": null
      },
      {
        "date": "2019-01-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1446",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1284",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1279",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1282",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-1281",
        "ident": null
      },
      {
        "date": "2018-10-23T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-21476",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-128415",
        "ident": null
      },
      {
        "date": "2018-10-17T00:00:00",
        "db": "BID",
        "id": "105691",
        "ident": null
      },
      {
        "date": "2019-07-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-008493",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201810-1025",
        "ident": null
      },
      {
        "date": "2024-11-21T03:55:11.267000",
        "db": "NVD",
        "id": "CVE-2018-17909",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON CX-Supervisor SCS File Parsing Use-After-Free Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-1283"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-1281"
      }
    ],
    "trust": 2.8
  },
  "type": {
    "_id": null,
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2fe53a0-39ab-11e9-b9bc-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201810-1025"
      }
    ],
    "trust": 0.8
  }
}

var-201803-2217
Vulnerability from variot

In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 ∙ Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 ∙ There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 ∙ A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CDM file. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3. Omron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2217",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-supervisor",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=3.30"
      },
      {
        "model": "cx-supervisor",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.4.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx supervisor",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-supervisor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ariele Caltabiano (kimiya)",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7525",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 5.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7525",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7525",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-05320",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137557",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-001951",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 5.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7525",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-001951",
            "trust": 5.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7525",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7525",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-05320",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-656",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1",
            "trust": 0.2,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137557",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability. Provided by OMRON Corporation CX-Supervisor Contains the following multiple vulnerabilities: * * Stack-based buffer overflow (CWE-121) - CVE-2018-7513 \u2219 Stack-based buffer overflow may occur due to processing of specially crafted project files. * * Uninitialized pointer access (CWE-824) - CVE-2018-7515 There is a possibility of accessing an uninitialized pointer due to the processing of a specially crafted packet. * * Write outside memory boundary (CWE-787) - CVE-2018-7517 \u2219 There is a possibility of writing outside the memory boundary due to processing of a specially crafted project file. * * Heap-based buffer overflow (CWE-122) - CVE-2018-7519 \u2219 A heap-based buffer overflow may occur due to processing of a specially crafted project file. * * Freed memory used (CWE-416) - CVE-2018-7521 This is a vulnerability in the use of released memory due to processing of specially crafted project files. * * Memory double release (CWE-415) - CVE-2018-7523 This is a memory double release vulnerability caused by processing of specially crafted project files. * * Untrusted pointer reference (CWE-822) - CVE-2018-7525 There is a possibility of referring to untrusted pointers due to processing of specially crafted packets.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-Supervisor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CDM file. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code under the context of the current process. CX-Supervisor is a Miscellaneous Shareware software. CX-Supervisor is dedicated to the design and operation of PC visualization and machine control. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3. \nOmron CX-Supervisor Versions 3.30 and prior are vulnerable; other versions may also be affected. Omron CX-Supervisor is a visual machine controller produced by Omron Corporation of Japan",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7525",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-072-01",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "103394",
        "trust": 2.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95051832",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5309",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "E2E6ACEF-39AB-11E9-A9B9-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "id": "VAR-201803-2217",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      }
    ],
    "trust": 1.4707547
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:39:28.470000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Release Notes For CX-Supervisor 3.4.1",
        "trust": 0.8,
        "url": "https://www.myomron.com/index.php?action=kb\u0026article=1707"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-072-01"
      },
      {
        "title": "Omron CX-Supervisor has an unspecified vulnerability (CNVD-2018-05320) patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/121535"
      },
      {
        "title": "Omron CX-Supervisor Buffer error vulnerability fix",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79275"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-822",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-476",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-416",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-824",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-415",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-072-01"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103394"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7513"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://ics-cert.us-cert.gov/recommended-practices"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95051832/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7515"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7517"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7519"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7521"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7523"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7525"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7513"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "db": "BID",
        "id": "103394"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-15T00:00:00",
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "date": "2018-03-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-03-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2018-03-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "date": "2018-03-21T20:29:01.387000",
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-23T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-260"
      },
      {
        "date": "2018-03-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-05320"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137557"
      },
      {
        "date": "2018-03-13T00:00:00",
        "db": "BID",
        "id": "103394"
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      },
      {
        "date": "2024-11-21T04:12:17.857000",
        "db": "NVD",
        "id": "CVE-2018-7525"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OMRON  CX-Supervisor Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-001951"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e2e6acef-39ab-11e9-a9b9-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-656"
      }
    ],
    "trust": 0.8
  }
}