Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-7514
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:03.779Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7514", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T23:35:36.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-7514\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-04-17T19:29:00.340\",\"lastModified\":\"2024-11-21T04:12:16.637\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.00\",\"matchCriteriaId\":\"AFB8B3D9-646D-4D95-BCBF-65910E65669F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.42\",\"matchCriteriaId\":\"6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.65\",\"matchCriteriaId\":\"8E51D1B1-AD65-4391-9139-7F37DD913299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.992\",\"matchCriteriaId\":\"E8DC4CD1-163E-4147-ACF9-5D9AED5E768F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.0.22\",\"matchCriteriaId\":\"C5FADD4F-7551-4630-BD15-53BE7160EDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.63\",\"matchCriteriaId\":\"712C5D5F-BA56-4072-99E5-3590DBE51564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.68\",\"matchCriteriaId\":\"E26D4997-1257-421A-A943-8F6BBBC40A7B\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
var-201804-1654
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": null, "trust": 3.5, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" } ], "trust": 3.5 }, "cve": "CVE-2018-7514", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 3.5, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7514", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07872", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137546", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7514", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2018-7514", "trust": 3.5, "value": "MEDIUM" }, { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7514", "trust": 1.0, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2018-07872", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7514" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 5.85 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7514", "trust": 7.1 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07872", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-792", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5440", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-287", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5402", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-281", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5405", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-284", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5403", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-282", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5406", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-285", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137546", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "id": "VAR-201804-1654", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07872" } ] }, "last_update_date": "2024-11-23T22:17:35.032000Z", "patch": { "_id": null, "data": [ { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 3.5, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126151" }, { "title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-121", "trust": 1.8 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-122", "trust": 0.8 }, { "problemtype": "CWE-843", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137546" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "references": { "_id": null, "data": [ { "trust": 6.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-287" }, { "db": "ZDI", "id": "ZDI-18-281" }, { "db": "ZDI", "id": "ZDI-18-284" }, { "db": "ZDI", "id": "ZDI-18-282" }, { "db": "ZDI", "id": "ZDI-18-285" }, { "db": "CNVD", "id": "CNVD-2018-07872" }, { "db": "VULHUB", "id": "VHN-137546" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-792" }, { "db": "NVD", "id": "CVE-2018-7514" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2018-04-17T19:29:00.340000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-287", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-281", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-284", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-282", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-285", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07872", "ident": null }, { "date": "2020-10-02T00:00:00", "db": "VULHUB", "id": "VHN-137546", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2020-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-792", "ident": null }, { "date": "2024-11-21T04:12:16.637000", "db": "NVD", "id": "CVE-2018-7514", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.6 }, "title": { "_id": null, "data": "OMRON CX-One Multiple vulnerabilities in applications included", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-792" } ], "trust": 0.8 } }
fkie_cve-2018-7514
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila." } ], "id": "CVE-2018-7514", "lastModified": "2024-11-21T04:12:16.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-p2qf-4mg3-c5h4
Vulnerability from github
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.
{ "affected": [], "aliases": [ "CVE-2018-7514" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-17T19:29:00Z", "severity": "HIGH" }, "details": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.", "id": "GHSA-p2qf-4mg3-c5h4", "modified": "2022-05-13T01:15:01Z", "published": "2022-05-13T01:15:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7514" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
icsa-18-100-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rgod" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT website.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-100-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Omron CX-One", "tracking": { "current_release_date": "2018-04-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-100-02", "initial_release_date": "2018-04-10T00:00:00.000000Z", "revision_history": [ { "date": "2018-04-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-100-02 Omron CX-One" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.992", "product": { "name": "CX-Protocol: versions 1.992 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CX-Protocol" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.00", "product": { "name": "CX-FLnet: versions 1.00 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CX-FLnet" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 9.65", "product": { "name": "CX-Programmer: versions 9.65 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CX-Programmer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 5.0.22", "product": { "name": "CX-Server: versions 5.0.22 and prior", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CX-Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.68", "product": { "name": "Switch Box Utility: versions 1.68 and prior", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Switch Box Utility" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.63", "product": { "name": "Network Configurator: versions 3.63 and prior", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Network Configurator" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=4.42", "product": { "name": "CX-One: Versions up to and including 4.42", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CX-One" } ], "category": "vendor", "name": "Omron" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a heap-based buffer overflow.CVE-2018-8834 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8834" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7514", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a stack-based buffer overflow.CVE-2018-7514 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7530", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.CVE-2018-7530 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7530" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] } ] }
ICSA-18-100-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rgod" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT website.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-100-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Omron CX-One", "tracking": { "current_release_date": "2018-04-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-100-02", "initial_release_date": "2018-04-10T00:00:00.000000Z", "revision_history": [ { "date": "2018-04-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-100-02 Omron CX-One" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.992", "product": { "name": "CX-Protocol: versions 1.992 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CX-Protocol" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.00", "product": { "name": "CX-FLnet: versions 1.00 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CX-FLnet" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 9.65", "product": { "name": "CX-Programmer: versions 9.65 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CX-Programmer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 5.0.22", "product": { "name": "CX-Server: versions 5.0.22 and prior", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CX-Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.68", "product": { "name": "Switch Box Utility: versions 1.68 and prior", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Switch Box Utility" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.63", "product": { "name": "Network Configurator: versions 3.63 and prior", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Network Configurator" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=4.42", "product": { "name": "CX-One: Versions up to and including 4.42", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CX-One" } ], "category": "vendor", "name": "Omron" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a heap-based buffer overflow.CVE-2018-8834 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8834" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7514", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a stack-based buffer overflow.CVE-2018-7514 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7530", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.CVE-2018-7530 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7530" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] } ] }
gsd-2018-7514
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-7514", "description": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.", "id": "GSD-2018-7514" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-7514" ], "details": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.", "id": "GSD-2018-7514", "modified": "2023-12-13T01:22:32.434057Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.0.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.992", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.68", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.63", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.42", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.65", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.00", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-7514" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-10-02T14:51Z", "publishedDate": "2018-04-17T19:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.