var-201804-1656
Vulnerability from variot

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Show details on source website


{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.00"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 9.65"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.992"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 5.0.22"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.63"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.68"
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "_id": null,
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.42"
      },
      {
        "_id": null,
        "model": "switch box utility",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.69"
      },
      {
        "_id": null,
        "model": "network configurator",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.64"
      },
      {
        "_id": null,
        "model": "cx-server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "5.0.23"
      },
      {
        "_id": null,
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "_id": null,
        "model": "cx-programmer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "9.66"
      },
      {
        "_id": null,
        "model": "cx-flnet",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.10"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx flnet",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx programmer",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx server",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "network configurator",
        "version": "*"
      },
      {
        "_id": null,
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "switch box utility",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "configurations": {
    "_id": null,
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:omron:cx-flnet",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-programmer",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-protocol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:cx-server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:network_configurator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:omron:switch_box_utility",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7530",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-7530",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7530",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-07873",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137562",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 2.4,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2018-7530",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-002441",
            "trust": 2.4,
            "value": "Medium"
          },
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7530",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7530",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-07873",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-791",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137562",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-100-02",
        "trust": 3.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95484528",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5404",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "103970",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "id": "VAR-201804-1656",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 1.502235625
  },
  "iot_taxonomy": {
    "_id": null,
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:17:35.160000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
      },
      {
        "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
      },
      {
        "title": "Omron CX-One code execution hole patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/126153"
      },
      {
        "title": "Omron CX-One Fixes for multiple software security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-843",
        "trust": 1.8
      },
      {
        "problemtype": "CWE-118",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95484528/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
        "ident": null
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-19T00:00:00",
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
        "ident": null
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-04-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "date": "2018-04-17T19:29:00.387000",
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283",
        "ident": null
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "ident": null
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562",
        "ident": null
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970",
        "ident": null
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "ident": null
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "ident": null
      },
      {
        "date": "2024-11-21T04:12:18.397000",
        "db": "NVD",
        "id": "CVE-2018-7530",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Omron CX-One Code execution hole",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.