Vulnerabilites related to omron - cx-protocol
var-201804-1654
Vulnerability from variot

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 3.5,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 9.65"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.992"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.63"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.68"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.42"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.69"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.64"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "5.0.23"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "9.66"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx flnet",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx programmer",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "network configurator",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "switch box utility",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-flnet",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-programmer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:network_configurator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:switch_box_utility",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      }
    ],
    "trust": 3.5
  },
  "cve": "CVE-2018-7514",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7514",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 3.5,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7514",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-07872",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137546",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 2.4,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7514",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-7514",
            "trust": 3.5,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-002441",
            "trust": 2.4,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7514",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-07872",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-792",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137546",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      }
    ],
    "trust": 5.85
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7514",
        "trust": 7.1
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-100-02",
        "trust": 3.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95484528",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5440",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5402",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5405",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5403",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5406",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "103970",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      }
    ]
  },
  "id": "VAR-201804-1654",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      }
    ],
    "trust": 1.502235625
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:17:35.032000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 3.5,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
      },
      {
        "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
      },
      {
        "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/126151"
      },
      {
        "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-121",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-843",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 6.9,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95484528/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-287"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-287",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-281",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-284",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-282",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-285",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07872",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137546",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7514",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-19T00:00:00",
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-287",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-281",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-284",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-282",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-285",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07872",
        "ident": null
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137546",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-04-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-792",
        "ident": null
      },
      {
        "date": "2018-04-17T19:29:00.340000",
        "db": "NVD",
        "id": "CVE-2018-7514",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-287",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-281",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-284",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-282",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-285",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07872",
        "ident": null
      },
      {
        "date": "2020-10-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137546",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2020-10-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-792",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:16.637000",
        "db": "NVD",
        "id": "CVE-2018-7514",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON  CX-One Multiple vulnerabilities in applications included",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-792"
      }
    ],
    "trust": 0.8
  }
}

var-201901-0858
Vulnerability from variot

Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 2.8,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.50"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 4.50"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 2.0"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.50"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=2.0"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "2.0"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "4.50"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "2.0.1"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "BID",
        "id": "106524"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-one",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Esteban Ruiz (mr_me) of Source Incite",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "BID",
        "id": "106524"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      }
    ],
    "trust": 3.7
  },
  "cve": "CVE-2018-19027",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-19027",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 5.4,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001004",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2019-01682",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "7d84a600-463f-11e9-9ea8-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-129645",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19027",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.8,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-19027",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "High",
            "baseScore": 6.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2019-001004",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-19027",
            "trust": 2.8,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-19027",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2019-001004",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2019-01682",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201901-432",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "7d84a600-463f-11e9-9ea8-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-129645",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "BID",
        "id": "106524"
      },
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      }
    ],
    "trust": 5.22
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-19027",
        "trust": 6.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-19-010-02",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "106524",
        "trust": 2.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU97716739",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6587",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6585",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6565",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-6566",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018",
        "trust": 0.7
      },
      {
        "db": "IVD",
        "id": "7D84A600-463F-11E9-9EA8-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-98818",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      },
      {
        "db": "BID",
        "id": "106524"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      }
    ]
  },
  "id": "VAR-201901-0858",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      }
    ],
    "trust": 1.468070575
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:48:30.648000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.2.01 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2019\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "Omron CX-One CX-Protocol patch for arbitrary code execution vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/150175"
      },
      {
        "title": "Omron CX-One CX-Protocol Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=88590"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-843",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-704",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 5.6,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-010-02"
      },
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/106524"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19027"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu97716739/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-19027"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.us/en/home"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682"
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645"
      },
      {
        "db": "BID",
        "id": "106524"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-120",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2019-01682",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-129645",
        "ident": null
      },
      {
        "db": "BID",
        "id": "106524",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-001004",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-19027",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-01-16T00:00:00",
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1",
        "ident": null
      },
      {
        "date": "2019-01-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-120",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-019",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-017",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-018",
        "ident": null
      },
      {
        "date": "2019-01-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-01682",
        "ident": null
      },
      {
        "date": "2019-01-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129645",
        "ident": null
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "BID",
        "id": "106524",
        "ident": null
      },
      {
        "date": "2019-01-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001004",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-432",
        "ident": null
      },
      {
        "date": "2019-01-30T16:29:00.690000",
        "db": "NVD",
        "id": "CVE-2018-19027",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2019-01-24T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-120",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-019",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-017",
        "ident": null
      },
      {
        "date": "2019-01-14T00:00:00",
        "db": "ZDI",
        "id": "ZDI-19-018",
        "ident": null
      },
      {
        "date": "2019-01-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2019-01682",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-129645",
        "ident": null
      },
      {
        "date": "2019-01-10T00:00:00",
        "db": "BID",
        "id": "106524",
        "ident": null
      },
      {
        "date": "2019-08-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-001004",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201901-432",
        "ident": null
      },
      {
        "date": "2024-11-21T03:57:11.363000",
        "db": "NVD",
        "id": "CVE-2018-19027",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "OMRON CX-One CX-Protocol CObject Type Confusion Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-19-120"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-019"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-017"
      },
      {
        "db": "ZDI",
        "id": "ZDI-19-018"
      }
    ],
    "trust": 2.8
  },
  "type": {
    "_id": null,
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "7d84a600-463f-11e9-9ea8-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201901-432"
      }
    ],
    "trust": 0.8
  }
}

var-201804-1656
Vulnerability from variot

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 9.65"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.992"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.63"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.68"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.42"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.69"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.64"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "5.0.23"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "9.66"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx flnet",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx programmer",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "network configurator",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "switch box utility",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-flnet",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-programmer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:network_configurator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:switch_box_utility",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7530",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7530",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7530",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-07873",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137562",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 2.4,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7530",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-002441",
            "trust": 2.4,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7530",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7530",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-07873",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-791",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137562",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-100-02",
        "trust": 3.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95484528",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5404",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "103970",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "id": "VAR-201804-1656",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 1.502235625
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:17:35.160000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
      },
      {
        "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
      },
      {
        "title": "Omron CX-One code execution hole patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/126153"
      },
      {
        "title": "Omron CX-One Fixes for multiple software security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-843",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-118",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95484528/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-19T00:00:00",
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-04-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "date": "2018-04-17T19:29:00.387000",
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:18.397000",
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-One Code execution hole",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.8
  }
}

var-202102-0317
Vulnerability from variot

The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.60"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.52"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.28"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.02"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-position",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-27259",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-27259",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-370741",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "Low",
            "baseScore": 6.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2020-27259",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-27259",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-27259",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-27259",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202101-405",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-370741",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-27259",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-007-02",
        "trust": 2.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-182",
        "trust": 2.4
      },
      {
        "db": "JVN",
        "id": "JVNVU95231601",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-11807",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0077",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      }
    ]
  },
  "id": "VAR-202102-0317",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-370741"
      }
    ],
    "trust": 0.6681076499999999
  },
  "last_update_date": "2024-11-23T22:47:42.455000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "title": "Omron Various product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138518"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-822",
        "trust": 1.8
      },
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-843",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.8,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "trust": 2.3,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-21-182/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu95231601"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-21-182",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-370741",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27259",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-182",
        "ident": null
      },
      {
        "date": "2021-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370741",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-01-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-405",
        "ident": null
      },
      {
        "date": "2021-02-09T15:15:13.097000",
        "db": "NVD",
        "id": "CVE-2020-27259",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-182",
        "ident": null
      },
      {
        "date": "2021-02-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370741",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-405",
        "ident": null
      },
      {
        "date": "2024-11-21T05:20:57.497000",
        "db": "NVD",
        "id": "CVE-2020-27259",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Made by OMRON  CX-One Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-405"
      }
    ],
    "trust": 0.6
  }
}

var-201804-1567
Vulnerability from variot

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 2.8,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 9.65"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.992"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.63"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.68"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.42"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.69"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.64"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "5.0.23"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "9.66"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx flnet",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx programmer",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "network configurator",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "switch box utility",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-flnet",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-programmer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:network_configurator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:switch_box_utility",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      }
    ],
    "trust": 2.8
  },
  "cve": "CVE-2018-8834",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-8834",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 2.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-8834",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-07871",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-138866",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 2.4,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-8834",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ],
        "severity": [
          {
            "author": "ZDI",
            "id": "CVE-2018-8834",
            "trust": 2.8,
            "value": "MEDIUM"
          },
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-002441",
            "trust": 2.4,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-8834",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-07871",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-790",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-138866",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-8834",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834"
      }
    ],
    "trust": 5.31
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-8834",
        "trust": 6.5
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-100-02",
        "trust": 3.5
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95484528",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5439",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5454",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5453",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5462",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "103970",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "E2EC2B30-39AB-11E9-8905-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      }
    ]
  },
  "id": "VAR-201804-1567",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      }
    ],
    "trust": 1.502235625
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:17:35.098000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
      },
      {
        "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
      },
      {
        "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "Omron CX-One heap buffer overflow vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/126149"
      },
      {
        "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80159"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-122",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-843",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 6.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95484528/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/787.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-286"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-286",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-289",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-288",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-290",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-138866",
        "ident": null
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-8834",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-8834",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-19T00:00:00",
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-286",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-289",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-288",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-290",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07871",
        "ident": null
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-138866",
        "ident": null
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-8834",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-04-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-790",
        "ident": null
      },
      {
        "date": "2018-04-17T19:29:00.437000",
        "db": "NVD",
        "id": "CVE-2018-8834",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-286",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-289",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-288",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-290",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07871",
        "ident": null
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-138866",
        "ident": null
      },
      {
        "date": "2020-09-29T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-8834",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2020-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-790",
        "ident": null
      },
      {
        "date": "2024-11-21T04:14:24.920000",
        "db": "NVD",
        "id": "CVE-2018-8834",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-One Heap Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07871"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Buffer error",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-790"
      }
    ],
    "trust": 0.8
  }
}

var-202102-0318
Vulnerability from variot

The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 1.4,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.60"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.52"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.28"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.02"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-position",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      }
    ],
    "trust": 1.4
  },
  "cve": "CVE-2020-27261",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-27261",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-370745",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "Low",
            "baseScore": 6.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-27261",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.4,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2020-27261",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-27261",
            "trust": 1.4,
            "value": "HIGH"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-27261",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202101-408",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-370745",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely.  User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      }
    ],
    "trust": 2.97
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-27261",
        "trust": 3.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-007-02",
        "trust": 2.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-185",
        "trust": 2.4
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183",
        "trust": 2.4
      },
      {
        "db": "JVN",
        "id": "JVNVU95231601",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-11810",
        "trust": 0.7
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-11808",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0077",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      }
    ]
  },
  "id": "VAR-202102-0318",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      }
    ],
    "trust": 0.6681076499999999
  },
  "last_update_date": "2024-11-23T22:47:42.419000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 1.4,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
      },
      {
        "title": "Omron Repair measures for buffer errors and vulnerabilities in many products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138519"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-121",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-843",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.5,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "trust": 2.3,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-21-185/"
      },
      {
        "trust": 1.7,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-21-183/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu95231601"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-370745",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27261",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-185",
        "ident": null
      },
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-183",
        "ident": null
      },
      {
        "date": "2021-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370745",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-01-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-408",
        "ident": null
      },
      {
        "date": "2021-02-09T15:15:13.157000",
        "db": "NVD",
        "id": "CVE-2020-27261",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-185",
        "ident": null
      },
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-183",
        "ident": null
      },
      {
        "date": "2021-02-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370745",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-408",
        "ident": null
      },
      {
        "date": "2024-11-21T05:20:57.687000",
        "db": "NVD",
        "id": "CVE-2020-27261",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-One NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-185"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-183"
      }
    ],
    "trust": 1.4
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-408"
      }
    ],
    "trust": 0.6
  }
}

var-202102-0316
Vulnerability from variot

This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.60"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.52"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.28"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "2.02"
      },
      {
        "_id": null,
        "model": "cx-position",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "omron",
        "version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-position",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2020-27257",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2020-27257",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-370737",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "Low",
            "baseScore": 6.6,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 1.6,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-27257",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "IPA score",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "JVNDB-2021-001004",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2020-27257",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "REQUIRED",
            "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 1.6,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2020-27257",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2021-001004",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2020-27257",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202101-423",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-370737",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      }
    ],
    "trust": 2.34
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2020-27257",
        "trust": 3.2
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-21-007-02",
        "trust": 2.5
      },
      {
        "db": "ZDI",
        "id": "ZDI-21-184",
        "trust": 2.4
      },
      {
        "db": "JVN",
        "id": "JVNVU95231601",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-11809",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0077",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      }
    ]
  },
  "id": "VAR-202102-0316",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      }
    ],
    "trust": 0.6681076499999999
  },
  "last_update_date": "2024-11-23T22:47:42.485000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
      },
      {
        "title": "Omron has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "title": "Omron Repair measures for buffer errors and vulnerabilities in many products",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138532"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-843",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-822",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 3.8,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
      },
      {
        "trust": 2.3,
        "url": "https://www.zerodayinitiative.com/advisories/zdi-21-184/"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnvu95231601"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184"
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-21-184",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-370737",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2020-27257",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-184",
        "ident": null
      },
      {
        "date": "2021-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370737",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-01-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-423",
        "ident": null
      },
      {
        "date": "2021-02-09T15:15:12.970000",
        "db": "NVD",
        "id": "CVE-2020-27257",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-21-184",
        "ident": null
      },
      {
        "date": "2021-02-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-370737",
        "ident": null
      },
      {
        "date": "2021-01-14T06:41:19",
        "db": "JVNDB",
        "id": "JVNDB-2021-001004",
        "ident": null
      },
      {
        "date": "2021-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202101-423",
        "ident": null
      },
      {
        "date": "2024-11-21T05:20:57.303000",
        "db": "NVD",
        "id": "CVE-2020-27257",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Made by OMRON  CX-One Multiple vulnerabilities in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-001004"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202101-423"
      }
    ],
    "trust": 0.6
  }
}

cve-2018-7514
Vulnerability from cvelistv5
Published
2018-04-17 19:00
Modified
2024-09-16 23:35
Severity ?
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-One Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:03.779Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-One",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "STACK-BASED BUFFER OVERFLOW CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-17T18:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-04-17T00:00:00",
          "ID": "CVE-2018-7514",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "STACK-BASED BUFFER OVERFLOW CWE-121"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7514",
    "datePublished": "2018-04-17T19:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T23:35:36.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-27257
Vulnerability from cvelistv5
Published
2021-02-09 14:10
Modified
2024-09-17 02:47
Severity ?
Summary
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
Impacted products
Vendor Product Version
Omron CX-One Version: unspecified   <
Create a notification for this product.
   Omron CX-Protocol Version: unspecified   <
Create a notification for this product.
   Omron CX-Server Version: unspecified   <
Create a notification for this product.
   Omron CX-Position Version: unspecified   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:11:36.464Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-One",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "4.60",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Protocol",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Server",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "5.0.28",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Position",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.52",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-01-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-10T18:06:13",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
        }
      ],
      "source": {
        "advisory": "ICSA-21-007-02",
        "discovery": "UNKNOWN"
      },
      "title": "Omron CX-One",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
          "ID": "CVE-2020-27257",
          "STATE": "PUBLIC",
          "TITLE": "Omron CX-One"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "4.60"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Protocol",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.02"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.0.28"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Position",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.52"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-21-007-02",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-27257",
    "datePublished": "2021-02-09T14:10:19.507744Z",
    "dateReserved": "2020-10-19T00:00:00",
    "dateUpdated": "2024-09-17T02:47:28.530Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-8834
Vulnerability from cvelistv5
Published
2018-04-17 19:00
Modified
2024-09-16 19:25
Severity ?
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-One Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:02:26.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-One",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "HEAP-BASED BUFFER OVERFLOW CWE-122",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-17T18:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-04-17T00:00:00",
          "ID": "CVE-2018-8834",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "HEAP-BASED BUFFER OVERFLOW CWE-122"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-8834",
    "datePublished": "2018-04-17T19:00:00Z",
    "dateReserved": "2018-03-20T00:00:00",
    "dateUpdated": "2024-09-16T19:25:23.504Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-19027
Vulnerability from cvelistv5
Published
2019-01-30 16:00
Modified
2024-09-16 17:09
Severity ?
Summary
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
References
Impacted products
Vendor Product Version
Omron CX-Protocol within CX-One Version: CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T11:23:08.658Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "106524",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106524"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-Protocol within CX-One",
          "vendor": "Omron",
          "versions": [
            {
              "status": "affected",
              "version": "CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior"
            }
          ]
        }
      ],
      "datePublic": "2019-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-01-31T10:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "name": "106524",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106524"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2019-01-10T00:00:00",
          "ID": "CVE-2018-19027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-Protocol within CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "CX-One Versions 4.50 and prior, including the following applications: CX-Protocol Versions 2.0 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "106524",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106524"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-19027",
    "datePublished": "2019-01-30T16:00:00Z",
    "dateReserved": "2018-11-06T00:00:00",
    "dateUpdated": "2024-09-16T17:09:00.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-27261
Vulnerability from cvelistv5
Published
2021-02-09 14:09
Modified
2024-09-17 00:02
Severity ?
Summary
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
Impacted products
Vendor Product Version
Omron CX-One Version: unspecified   <
Create a notification for this product.
   Omron CX-Protocol Version: unspecified   <
Create a notification for this product.
   Omron CX-Server Version: unspecified   <
Create a notification for this product.
   Omron CX-Position Version: unspecified   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:11:36.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-One",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "4.60",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Protocol",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Server",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "5.0.28",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Position",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.52",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-01-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "STACK-BASED BUFFER OVERFLOW CWE-121",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-10T18:06:17",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
        }
      ],
      "source": {
        "advisory": "ICSA-21-007-02",
        "discovery": "UNKNOWN"
      },
      "title": "Omron CX-One",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
          "ID": "CVE-2020-27261",
          "STATE": "PUBLIC",
          "TITLE": "Omron CX-One"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "4.60"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Protocol",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.02"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.0.28"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Position",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.52"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "STACK-BASED BUFFER OVERFLOW CWE-121"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-21-007-02",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-27261",
    "datePublished": "2021-02-09T14:09:34.782476Z",
    "dateReserved": "2020-10-19T00:00:00",
    "dateUpdated": "2024-09-17T00:02:18.058Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-7530
Vulnerability from cvelistv5
Published
2018-04-17 19:00
Modified
2024-09-16 16:28
Severity ?
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
References
Impacted products
Vendor Product Version
ICS-CERT Omron CX-One Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T06:31:04.359Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Omron CX-One",
          "vendor": "ICS-CERT",
          "versions": [
            {
              "status": "affected",
              "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
            }
          ]
        }
      ],
      "datePublic": "2018-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-843",
              "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-17T18:57:01",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2018-04-17T00:00:00",
          "ID": "CVE-2018-7530",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Omron CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ICS-CERT"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2018-7530",
    "datePublished": "2018-04-17T19:00:00Z",
    "dateReserved": "2018-02-26T00:00:00",
    "dateUpdated": "2024-09-16T16:28:21.613Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-27259
Vulnerability from cvelistv5
Published
2021-02-09 14:09
Modified
2024-09-16 16:33
Severity ?
Summary
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
Impacted products
Vendor Product Version
Omron CX-One Version: unspecified   <
Create a notification for this product.
   Omron CX-Protocol Version: unspecified   <
Create a notification for this product.
   Omron CX-Server Version: unspecified   <
Create a notification for this product.
   Omron CX-Position Version: unspecified   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:11:36.396Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CX-One",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "4.60",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Protocol",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.02",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Server",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "5.0.28",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CX-Position",
          "vendor": "Omron",
          "versions": [
            {
              "lessThanOrEqual": "2.52",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-01-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-822",
              "description": "UNTRUSTED POINTER DEREFERENCE CWE-822",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-10T18:06:18",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
        }
      ],
      "source": {
        "advisory": "ICSA-21-007-02",
        "discovery": "UNKNOWN"
      },
      "title": "Omron CX-One",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "ics-cert@hq.dhs.gov",
          "DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
          "ID": "CVE-2020-27259",
          "STATE": "PUBLIC",
          "TITLE": "Omron CX-One"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CX-One",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "4.60"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Protocol",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.02"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.0.28"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CX-Position",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.52"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Omron"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNTRUSTED POINTER DEREFERENCE CWE-822"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
            },
            {
              "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/",
              "refsource": "MISC",
              "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
            }
          ]
        },
        "source": {
          "advisory": "ICSA-21-007-02",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2020-27259",
    "datePublished": "2021-02-09T14:09:11.732043Z",
    "dateReserved": "2020-10-19T00:00:00",
    "dateUpdated": "2024-09-16T16:33:13.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2019-01-30 16:29
Modified
2024-11-21 03:57
Summary
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
Impacted products
Vendor Product Version
omron cx-one *
omron cx-protocol *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAAAE41D-4A61-4ED4-9DCF-05FD7EFF3B3E",
              "versionEndIncluding": "4.50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92EA8E6-7567-46FD-8CBE-6FEFC7D36C7B",
              "versionEndIncluding": "2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
    },
    {
      "lang": "es",
      "value": "Existen tres vulnerabilidades de confusi\u00f3n de tipos en CX-One, en versiones 4.50 y anteriores, y en CX-Protocol, en versiones 2.0 y anteriores, durante el procesamiento de archivos de proyecto. Un atacante podr\u00eda usar un archivo de proyecto especialmente manipulado para explotar y ejecutar c\u00f3digo con los privilegios de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2018-19027",
  "lastModified": "2024-11-21T03:57:11.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-01-30T16:29:00.690",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/106524"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/106524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-010-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-704"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-09 15:15
Modified
2024-11-21 05:20
Summary
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
Impacted products
Vendor Product Version
omron cx-one *
omron cx-position *
omron cx-protocol *
omron cx-server *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2",
              "versionEndIncluding": "4.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2",
              "versionEndIncluding": "2.52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A",
              "versionEndIncluding": "2.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4",
              "versionEndIncluding": "5.0.28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
    },
    {
      "lang": "es",
      "value": "Esta vulnerabilidad permite a atacantes locales ejecutar c\u00f3digo arbitrario debido a una falta de comprobaci\u00f3n apropiada de los datos suministrados por un usuario, lo que puede resultar en una condici\u00f3n de confusi\u00f3n de tipos en Omron CX-One Versi\u00f3n 4.60 y dispositivos anteriores"
    }
  ],
  "id": "CVE-2020-27257",
  "lastModified": "2024-11-21T05:20:57.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-09T15:15:12.970",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-17 19:29
Modified
2024-11-21 04:12
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
              "versionEndIncluding": "1.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
              "versionEndIncluding": "4.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
              "versionEndIncluding": "9.65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
              "versionEndIncluding": "1.992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
              "versionEndIncluding": "5.0.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
              "versionEndIncluding": "3.63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
              "versionEndIncluding": "1.68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila."
    }
  ],
  "id": "CVE-2018-7514",
  "lastModified": "2024-11-21T04:12:16.637",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-17T19:29:00.340",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-17 19:29
Modified
2024-11-21 04:14
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
              "versionEndIncluding": "1.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
              "versionEndIncluding": "4.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
              "versionEndIncluding": "9.65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
              "versionEndIncluding": "1.992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
              "versionEndIncluding": "5.0.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
              "versionEndIncluding": "3.63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
              "versionEndIncluding": "1.68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)."
    }
  ],
  "id": "CVE-2018-8834",
  "lastModified": "2024-11-21T04:14:24.920",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-17T19:29:00.437",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-17 19:29
Modified
2024-11-21 04:12
Summary
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
References



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
              "versionEndIncluding": "1.00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
              "versionEndIncluding": "4.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
              "versionEndIncluding": "9.65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
              "versionEndIncluding": "1.992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
              "versionEndIncluding": "5.0.22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
              "versionEndIncluding": "3.63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
              "versionEndIncluding": "1.68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
    },
    {
      "lang": "es",
      "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible."
    }
  ],
  "id": "CVE-2018-7530",
  "lastModified": "2024-11-21T04:12:18.397",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-17T19:29:00.387",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-118"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-09 15:15
Modified
2024-11-21 05:20
Summary
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.
Impacted products
Vendor Product Version
omron cx-one *
omron cx-position *
omron cx-protocol *
omron cx-server *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2",
              "versionEndIncluding": "4.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2",
              "versionEndIncluding": "2.52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A",
              "versionEndIncluding": "2.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4",
              "versionEndIncluding": "5.0.28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Omron CX-One versiones 4.60 y anteriores, puede permitir a un atacante suministrar un puntero a ubicaciones de memoria arbitrarias, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente"
    }
  ],
  "id": "CVE-2020-27259",
  "lastModified": "2024-11-21T05:20:57.497",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-09T15:15:13.097",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-822"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-09 15:15
Modified
2024-11-21 05:20
Summary
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.
Impacted products
Vendor Product Version
omron cx-one *
omron cx-position *
omron cx-protocol *
omron cx-server *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DDFA8C8-5BB3-4A0A-BFA8-0963C46B6DD2",
              "versionEndIncluding": "4.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-position:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A75973B-C2B1-4CFC-A2A9-BFB553037BF2",
              "versionEndIncluding": "2.52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E61B773-2097-4C4E-B48C-CFC7294A4C5A",
              "versionEndIncluding": "2.02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD31345-F164-4016-902E-DA9AD29430E4",
              "versionEndIncluding": "5.0.28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "El Omron CX-One versiones 4.60 y anteriores es vulnerable a un desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria, lo que puede permitir a un atacante ejecutar c\u00f3digo arbitrario remotamente"
    }
  ],
  "id": "CVE-2020-27261",
  "lastModified": "2024-11-21T05:20:57.687",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-09T15:15:13.157",
  "references": [
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
    },
    {
      "source": "ics-cert@hq.dhs.gov",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
    }
  ],
  "sourceIdentifier": "ics-cert@hq.dhs.gov",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-121"
        }
      ],
      "source": "ics-cert@hq.dhs.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}