Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-7530 (GCVE-0-2018-7530)
Vulnerability from cvelistv5
- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION)
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
ICS-CERT | Omron CX-One |
Version: The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Omron CX-One", "vendor": "ICS-CERT", "versions": [ { "status": "affected", "version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } ], "datePublic": "2018-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-843", "description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-17T18:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-7530", "datePublished": "2018-04-17T19:00:00Z", "dateReserved": "2018-02-26T00:00:00", "dateUpdated": "2024-09-16T16:28:21.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-7530\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-04-17T19:29:00.387\",\"lastModified\":\"2024-11-21T04:12:18.397\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.\"},{\"lang\":\"es\",\"value\":\"El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-118\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.00\",\"matchCriteriaId\":\"AFB8B3D9-646D-4D95-BCBF-65910E65669F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.42\",\"matchCriteriaId\":\"6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.65\",\"matchCriteriaId\":\"8E51D1B1-AD65-4391-9139-7F37DD913299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.992\",\"matchCriteriaId\":\"E8DC4CD1-163E-4147-ACF9-5D9AED5E768F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.0.22\",\"matchCriteriaId\":\"C5FADD4F-7551-4630-BD15-53BE7160EDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.63\",\"matchCriteriaId\":\"712C5D5F-BA56-4072-99E5-3590DBE51564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.68\",\"matchCriteriaId\":\"E26D4997-1257-421A-A943-8F6BBBC40A7B\"}]}]}],\"references\":[{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
gsd-2018-7530
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-7530", "description": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.", "id": "GSD-2018-7530" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-7530" ], "details": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.", "id": "GSD-2018-7530", "modified": "2023-12-13T01:22:32.962040Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-04-17T00:00:00", "ID": "CVE-2018-7530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Omron CX-One", "version": { "version_data": [ { "version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior." } ] } } ] }, "vendor_name": "ICS-CERT" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.68", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.0.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "9.65", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.992", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.00", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.42", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.63", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2018-7530" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-118" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:42Z", "publishedDate": "2018-04-17T19:29Z" } } }
var-201804-1656
Vulnerability from variot
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "cx-one", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 1.0, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "switch box utility", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.68" }, { "_id": null, "model": "network configurator", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "3.63" }, { "_id": null, "model": "cx-server", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "5.0.22" }, { "_id": null, "model": "cx-protocol", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.992" }, { "_id": null, "model": "cx-programmer", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "9.65" }, { "_id": null, "model": "cx-one", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "4.42" }, { "_id": null, "model": "cx-flnet", "scope": "eq", "trust": 0.9, "vendor": "omron", "version": "1.00" }, { "_id": null, "model": "cx-flnet", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.00" }, { "_id": null, "model": "cx-programmer", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 9.65" }, { "_id": null, "model": "cx-protocol", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.992" }, { "_id": null, "model": "cx-server", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 5.0.22" }, { "_id": null, "model": "network configurator", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 3.63" }, { "_id": null, "model": "switch box utility", "scope": "lte", "trust": 0.8, "vendor": "omron", "version": "version 1.68" }, { "_id": null, "model": "cx-one", "scope": null, "trust": 0.7, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-flnet", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-protocol", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-programmer", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-server", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "network configurator", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "switch box utility", "scope": null, "trust": 0.6, "vendor": "omron", "version": null }, { "_id": null, "model": "cx-one", "scope": "lte", "trust": 0.6, "vendor": "omron", "version": "\u003c=4.42" }, { "_id": null, "model": "switch box utility", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.69" }, { "_id": null, "model": "network configurator", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "3.64" }, { "_id": null, "model": "cx-server", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "5.0.23" }, { "_id": null, "model": "cx-protocol", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.993" }, { "_id": null, "model": "cx-programmer", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "9.66" }, { "_id": null, "model": "cx-flnet", "scope": "ne", "trust": 0.3, "vendor": "omron", "version": "1.10" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx flnet", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx one", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx programmer", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx protocol", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "cx server", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "network configurator", "version": "*" }, { "_id": null, "model": null, "scope": "eq", "trust": 0.2, "vendor": "switch box utility", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:omron:cx-flnet", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-programmer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-protocol", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:cx-server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:network_configurator", "vulnerable": true }, { "cpe22Uri": "cpe:/a:omron:switch_box_utility", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002441" } ] }, "credits": { "_id": null, "data": "rgod", "sources": [ { "db": "ZDI", "id": "ZDI-18-283" } ], "trust": 0.7 }, "cve": "CVE-2018-7530", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "JPCERT/CC", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 2.4, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-7530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-07873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-137562", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "Low", "attackVector": "Local", "author": "JPCERT/CC", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2018-002441", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 2.4, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-7530", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "JPCERT/CC", "id": "JVNDB-2018-002441", "trust": 2.4, "value": "Medium" }, { "author": "nvd@nist.gov", "id": "CVE-2018-7530", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2018-7530", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-07873", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-137562", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "description": { "_id": null, "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3", "sources": [ { "db": "NVD", "id": "CVE-2018-7530" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "BID", "id": "103970" }, { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 3.33 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-7530", "trust": 4.3 }, { "db": "ICS CERT", "id": "ICSA-18-100-02", "trust": 3.4 }, { "db": "CNVD", "id": "CNVD-2018-07873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-791", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU95484528", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-5404", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-18-283", "trust": 0.7 }, { "db": "BID", "id": "103970", "trust": 0.3 }, { "db": "IVD", "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-137562", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "id": "VAR-201804-1656", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" } ], "trust": 1.502235625 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ] }, "last_update_date": "2024-11-23T22:17:35.160000Z", "patch": { "_id": null, "data": [ { "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator" }, { "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility" }, { "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module" }, { "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet" }, { "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html" }, { "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer" }, { "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09", "trust": 0.8, "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol" }, { "title": "OMRON has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "title": "Omron CX-One code execution hole patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/126153" }, { "title": "Omron CX-One Fixes for multiple software security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-843", "trust": 1.8 }, { "problemtype": "CWE-118", "trust": 1.1 }, { "problemtype": "CWE-121", "trust": 0.8 }, { "problemtype": "CWE-122", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-137562" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "references": { "_id": null, "data": [ { "trust": 4.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95484528/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834" }, { "trust": 0.3, "url": "https://industrial.omron.eu/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-18-283" }, { "db": "CNVD", "id": "CNVD-2018-07873" }, { "db": "VULHUB", "id": "VHN-137562" }, { "db": "BID", "id": "103970" }, { "db": "JVNDB", "id": "JVNDB-2018-002441" }, { "db": "CNNVD", "id": "CNNVD-201804-791" }, { "db": "NVD", "id": "CVE-2018-7530" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "db": "BID", "id": "103970", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-04-19T00:00:00", "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1", "ident": null }, { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2018-04-17T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-04-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2018-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2018-04-17T19:29:00.387000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-04-11T00:00:00", "db": "ZDI", "id": "ZDI-18-283", "ident": null }, { "date": "2018-04-19T00:00:00", "db": "CNVD", "id": "CNVD-2018-07873", "ident": null }, { "date": "2019-10-09T00:00:00", "db": "VULHUB", "id": "VHN-137562", "ident": null }, { "date": "2018-04-10T00:00:00", "db": "BID", "id": "103970", "ident": null }, { "date": "2018-08-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002441", "ident": null }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-791", "ident": null }, { "date": "2024-11-21T04:12:18.397000", "db": "NVD", "id": "CVE-2018-7530", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Omron CX-One Code execution hole", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-07873" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Code problem", "sources": [ { "db": "IVD", "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1" }, { "db": "CNNVD", "id": "CNNVD-201804-791" } ], "trust": 0.8 } }
cnvd-2018-07873
Vulnerability from cnvd
Title: Omron CX-One代码执行洞
Description:
Omron CX-One是日本(欧姆龙)Omron公司的一套集成工具包,其中包括了用于网络、PT、变频器、温度控制器以及PLC编程软件等。CX-FLnet等都是集成在其中的应用程序。
Omron CX-One 4.42及之前版本中的多个软件存在安全漏洞。攻击者可借助畸形的项目文件利用该漏洞执行代码。
Severity: 中
Patch Name: Omron CX-One代码执行洞的补丁
Patch Description:
Omron CX-One是日本(欧姆龙)Omron公司的一套集成工具包,其中包括了用于网络、PT、变频器、温度控制器以及PLC编程软件等。CX-FLnet等都是集成在其中的应用程序。
Omron CX-One 4.42及之前版本中的多个软件存在安全漏洞。攻击者可借助畸形的项目文件利用该漏洞执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.omron.com/
Reference: https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02
Name | ['OMRON CX-FLnet', 'OMRON CX-Protocol', 'OMRON CX-Programmer', 'OMRON CX-Server', 'OMRON Network Configurator', 'OMRON Switch Box Utility', 'OMRON CX-One <=4.42'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-7530" } }, "description": "Omron CX-One\u662f\u65e5\u672c\uff08\u6b27\u59c6\u9f99\uff09Omron\u516c\u53f8\u7684\u4e00\u5957\u96c6\u6210\u5de5\u5177\u5305\uff0c\u5176\u4e2d\u5305\u62ec\u4e86\u7528\u4e8e\u7f51\u7edc\u3001PT\u3001\u53d8\u9891\u5668\u3001\u6e29\u5ea6\u63a7\u5236\u5668\u4ee5\u53caPLC\u7f16\u7a0b\u8f6f\u4ef6\u7b49\u3002CX-FLnet\u7b49\u90fd\u662f\u96c6\u6210\u5728\u5176\u4e2d\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nOmron CX-One 4.42\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u7684\u591a\u4e2a\u8f6f\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7578\u5f62\u7684\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u3002", "discovererName": "Rgod", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a \r\nhttp://www.omron.com/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-07873", "openTime": "2018-04-19", "patchDescription": "Omron CX-One\u662f\u65e5\u672c\uff08\u6b27\u59c6\u9f99\uff09Omron\u516c\u53f8\u7684\u4e00\u5957\u96c6\u6210\u5de5\u5177\u5305\uff0c\u5176\u4e2d\u5305\u62ec\u4e86\u7528\u4e8e\u7f51\u7edc\u3001PT\u3001\u53d8\u9891\u5668\u3001\u6e29\u5ea6\u63a7\u5236\u5668\u4ee5\u53caPLC\u7f16\u7a0b\u8f6f\u4ef6\u7b49\u3002CX-FLnet\u7b49\u90fd\u662f\u96c6\u6210\u5728\u5176\u4e2d\u7684\u5e94\u7528\u7a0b\u5e8f\u3002\r\n\r\nOmron CX-One 4.42\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u7684\u591a\u4e2a\u8f6f\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7578\u5f62\u7684\u9879\u76ee\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Omron CX-One\u4ee3\u7801\u6267\u884c\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "OMRON CX-FLnet", "OMRON CX-Protocol", "OMRON CX-Programmer", "OMRON CX-Server", "OMRON Network Configurator", "OMRON Switch Box Utility", "OMRON CX-One \u003c=4.42" ] }, "referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", "serverity": "\u4e2d", "submitTime": "2018-04-13", "title": "Omron CX-One\u4ee3\u7801\u6267\u884c\u6d1e" }
fkie_cve-2018-7530
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
omron | cx-flnet | * | |
omron | cx-one | * | |
omron | cx-programmer | * | |
omron | cx-protocol | * | |
omron | cx-server | * | |
omron | network_configurator | * | |
omron | switch_box_utility | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFB8B3D9-646D-4D95-BCBF-65910E65669F", "versionEndIncluding": "1.00", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C1865E7-6B16-4F3F-9F49-CFA81A09FAF3", "versionEndIncluding": "4.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E51D1B1-AD65-4391-9139-7F37DD913299", "versionEndIncluding": "9.65", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8DC4CD1-163E-4147-ACF9-5D9AED5E768F", "versionEndIncluding": "1.992", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5FADD4F-7551-4630-BD15-53BE7160EDA8", "versionEndIncluding": "5.0.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*", "matchCriteriaId": "712C5D5F-BA56-4072-99E5-3590DBE51564", "versionEndIncluding": "3.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D4997-1257-421A-A943-8F6BBBC40A7B", "versionEndIncluding": "1.68", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." }, { "lang": "es", "value": "El an\u00e1lisis sint\u00e1ctico de archivos de proyecto mal formados en Omron CX-One, en versiones 4.42 y anteriores, incluyendo las siguientes aplicaciones: CX-FLnet, en versiones 1.00 y anteriores; CX-Protocol, en versiones 1.992 y anteriores; CX-Programmer, en versiones 9.65 y anteriores; CX-Server, en versiones 5.0.22 y anteriores; Network Configurator, en versiones 3.63 y anteriores y Switch Box Utility, en versiones 1.68 y anteriores, podr\u00eda permitir que el puntero llame a un objeto incorrecto, lo que resulta en un acceso del recurso empleando una condici\u00f3n de tipo incompatible." } ], "id": "CVE-2018-7530", "lastModified": "2024-11-21T04:12:18.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-17T19:29:00.387", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-118" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-rwjj-72mq-wxxc
Vulnerability from github
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
{ "affected": [], "aliases": [ "CVE-2018-7530" ], "database_specific": { "cwe_ids": [ "CWE-118" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-17T19:29:00Z", "severity": "HIGH" }, "details": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.", "id": "GHSA-rwjj-72mq-wxxc", "modified": "2022-05-13T01:31:51Z", "published": "2022-05-13T01:31:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7530" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
ICSA-18-100-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rgod" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT website.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-100-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Omron CX-One", "tracking": { "current_release_date": "2018-04-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-100-02", "initial_release_date": "2018-04-10T00:00:00.000000Z", "revision_history": [ { "date": "2018-04-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-100-02 Omron CX-One" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.992", "product": { "name": "CX-Protocol: versions 1.992 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CX-Protocol" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.00", "product": { "name": "CX-FLnet: versions 1.00 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CX-FLnet" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 9.65", "product": { "name": "CX-Programmer: versions 9.65 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CX-Programmer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 5.0.22", "product": { "name": "CX-Server: versions 5.0.22 and prior", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CX-Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.68", "product": { "name": "Switch Box Utility: versions 1.68 and prior", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Switch Box Utility" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.63", "product": { "name": "Network Configurator: versions 3.63 and prior", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Network Configurator" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=4.42", "product": { "name": "CX-One: Versions up to and including 4.42", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CX-One" } ], "category": "vendor", "name": "Omron" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a heap-based buffer overflow.CVE-2018-8834 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8834" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7514", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a stack-based buffer overflow.CVE-2018-7514 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7530", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.CVE-2018-7530 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7530" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] } ] }
icsa-18-100-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "names": [ "Rgod" ], "organization": "Trend Micro \u0027s Zero Day Initiative", "summary": "reporting these vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow remote code execution.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Japan", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT website.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-100-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-100-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-100-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "Omron CX-One", "tracking": { "current_release_date": "2018-04-10T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-100-02", "initial_release_date": "2018-04-10T00:00:00.000000Z", "revision_history": [ { "date": "2018-04-10T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-100-02 Omron CX-One" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.992", "product": { "name": "CX-Protocol: versions 1.992 and prior", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CX-Protocol" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.00", "product": { "name": "CX-FLnet: versions 1.00 and prior", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CX-FLnet" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 9.65", "product": { "name": "CX-Programmer: versions 9.65 and prior", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CX-Programmer" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 5.0.22", "product": { "name": "CX-Server: versions 5.0.22 and prior", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CX-Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 1.68", "product": { "name": "Switch Box Utility: versions 1.68 and prior", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Switch Box Utility" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 3.63", "product": { "name": "Network Configurator: versions 3.63 and prior", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "Network Configurator" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=4.42", "product": { "name": "CX-One: Versions up to and including 4.42", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CX-One" } ], "category": "vendor", "name": "Omron" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-8834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a heap-based buffer overflow.CVE-2018-8834 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8834" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7514", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may cause a stack-based buffer overflow.CVE-2018-7514 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] }, { "cve": "CVE-2018-7530", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "Parsing malformed project files may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.CVE-2018-7530 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-7530" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "remediations": [ { "category": "vendor_fix", "details": "Omron has released an updated version of CX-One to address the reported vulnerabilities. These releases are available through the CX-One auto-update service.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-FLnet version 1.10,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Protocol version 1.993,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "CX-Programmer versions 9.66,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Common Module including CX-Server version 5.0.23,", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Network Configurator version 3.64, and", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] }, { "category": "mitigation", "details": "Switch Box Utility version 1.69", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007" ] } ] } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.