Vulnerabilites related to omron - cx-flnet
CVE-2018-7514 (GCVE-0-2018-7514)
Vulnerability from cvelistv5
- CWE-121 - STACK-BASED BUFFER OVERFLOW
| ▼ | URL | Tags |
|---|---|---|
| https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:03.779Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7514",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7514",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T23:35:36.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8834 (GCVE-0-2018-8834)
Vulnerability from cvelistv5
- CWE-122 - HEAP-BASED BUFFER OVERFLOW
| ▼ | URL | Tags |
|---|---|---|
| https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:02:26.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "HEAP-BASED BUFFER OVERFLOW CWE-122",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-8834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HEAP-BASED BUFFER OVERFLOW CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-8834",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-03-20T00:00:00",
"dateUpdated": "2024-09-16T19:25:23.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-7530 (GCVE-0-2018-7530)
Vulnerability from cvelistv5
- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION)
| ▼ | URL | Tags |
|---|---|---|
| https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | x_refsource_MISC |
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:04.359Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7530",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T16:28:21.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
var-201804-1656
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
}
],
"trust": 0.7
},
"cve": "CVE-2018-7530",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-7530",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-7530",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07873",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-137562",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-7530",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-7530",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2018-7530",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-07873",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-791",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-137562",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7530"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-137562"
}
],
"trust": 3.33
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-7530",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.4
},
{
"db": "CNVD",
"id": "CNVD-2018-07873",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5404",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-283",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-137562",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"id": "VAR-201804-1656",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
}
]
},
"last_update_date": "2024-11-23T22:17:35.160000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Omron CX-One code execution hole patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126153"
},
{
"title": "Omron CX-One Fixes for multiple software security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-843",
"trust": 1.8
},
{
"problemtype": "CWE-118",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-122",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"date": "2018-04-17T19:29:00.387000",
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"date": "2024-11-21T04:12:18.397000",
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Omron CX-One Code execution hole",
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Code problem",
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
],
"trust": 0.8
}
}
var-201804-1654
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 3.5,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
}
],
"trust": 3.5
},
"cve": "CVE-2018-7514",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-7514",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 3.5,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-7514",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07872",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-137546",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-7514",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2018-7514",
"trust": 3.5,
"value": "MEDIUM"
},
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-7514",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-07872",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-792",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-137546",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7514"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-137546"
}
],
"trust": 5.85
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-7514",
"trust": 7.1
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.4
},
{
"db": "CNVD",
"id": "CNVD-2018-07872",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5440",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-287",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5402",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-281",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5405",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-284",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5403",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-282",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5406",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-285",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-137546",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"id": "VAR-201804-1654",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
}
]
},
"last_update_date": "2024-11-23T22:17:35.032000Z",
"patch": {
"_id": null,
"data": [
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126151"
},
{
"title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-121",
"trust": 1.8
},
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-122",
"trust": 0.8
},
{
"problemtype": "CWE-843",
"trust": 0.8
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 6.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"date": "2018-04-17T19:29:00.340000",
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"date": "2020-10-02T00:00:00",
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2020-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"date": "2024-11-21T04:12:16.637000",
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "OMRON CX-One Multiple vulnerabilities in applications included",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
],
"trust": 0.8
}
}
var-201804-1567
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 2.8,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
}
],
"trust": 2.8
},
"cve": "CVE-2018-8834",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-8834",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 2.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-8834",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07871",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-138866",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-8834",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2018-8834",
"trust": 2.8,
"value": "MEDIUM"
},
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-8834",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-07871",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-790",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-138866",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2018-8834",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-8834"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
}
],
"trust": 5.31
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-8834",
"trust": 6.5
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.5
},
{
"db": "CNVD",
"id": "CNVD-2018-07871",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5439",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-286",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5454",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-289",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5453",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-288",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5462",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-290",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EC2B30-39AB-11E9-8905-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-138866",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-8834",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"id": "VAR-201804-1567",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
}
]
},
"last_update_date": "2024-11-23T22:17:35.098000Z",
"patch": {
"_id": null,
"data": [
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "Omron CX-One heap buffer overflow vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126149"
},
{
"title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80159"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-122",
"trust": 1.8
},
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-843",
"trust": 0.8
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 6.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"date": "2018-04-17T19:29:00.437000",
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"date": "2020-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"date": "2020-09-29T00:00:00",
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2020-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"date": "2024-11-21T04:14:24.920000",
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Omron CX-One Heap Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
],
"trust": 0.8
}
}
Vulnerability from fkie_nvd
| ▼ | URL | Tags | |
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| omron | cx-flnet | * | |
| omron | cx-one | * | |
| omron | cx-programmer | * | |
| omron | cx-protocol | * | |
| omron | cx-server | * | |
| omron | network_configurator | * | |
| omron | switch_box_utility | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
"versionEndIncluding": "1.00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
"versionEndIncluding": "4.42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
"versionEndIncluding": "9.65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
"versionEndIncluding": "1.992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
"versionEndIncluding": "5.0.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
"versionEndIncluding": "3.63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
"versionEndIncluding": "1.68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
},
{
"lang": "es",
"value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible."
}
],
"id": "CVE-2018-7530",
"lastModified": "2024-11-21T04:12:18.397",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-17T19:29:00.387",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-843"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-118"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
| ▼ | URL | Tags | |
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| omron | cx-flnet | * | |
| omron | cx-one | * | |
| omron | cx-programmer | * | |
| omron | cx-protocol | * | |
| omron | cx-server | * | |
| omron | network_configurator | * | |
| omron | switch_box_utility | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
"versionEndIncluding": "1.00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
"versionEndIncluding": "4.42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
"versionEndIncluding": "9.65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
"versionEndIncluding": "1.992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
"versionEndIncluding": "5.0.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
"versionEndIncluding": "3.63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
"versionEndIncluding": "1.68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
},
{
"lang": "es",
"value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en memoria din\u00e1mica (heap)."
}
],
"id": "CVE-2018-8834",
"lastModified": "2024-11-21T04:14:24.920",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-17T19:29:00.437",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Vulnerability from fkie_nvd
| ▼ | URL | Tags | |
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| omron | cx-flnet | * | |
| omron | cx-one | * | |
| omron | cx-programmer | * | |
| omron | cx-protocol | * | |
| omron | cx-server | * | |
| omron | network_configurator | * | |
| omron | switch_box_utility | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F",
"versionEndIncluding": "1.00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3",
"versionEndIncluding": "4.42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299",
"versionEndIncluding": "9.65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F",
"versionEndIncluding": "1.992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8",
"versionEndIncluding": "5.0.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564",
"versionEndIncluding": "3.63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B",
"versionEndIncluding": "1.68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
},
{
"lang": "es",
"value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda provocar un desbordamiento de b\u00fafer basado en pila."
}
],
"id": "CVE-2018-7514",
"lastModified": "2024-11-21T04:12:16.637",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-17T19:29:00.340",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}