Search criteria
27 vulnerabilities found for cx-server by omron
VAR-202102-0316
Vulnerability from variot - Updated: 2024-11-23 22:47This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.60"
},
{
"_id": null,
"model": "cx-position",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.52"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.28"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.02"
},
{
"_id": null,
"model": "cx-position",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27257"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-position",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
}
],
"trust": 0.7
},
"cve": "CVE-2020-27257",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-27257",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-370737",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "Low",
"baseScore": 6.6,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 1.6,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27257",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27257",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 1.6,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-27257",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-27257",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-423",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-370737",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "VULHUB",
"id": "VHN-370737"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
},
{
"db": "NVD",
"id": "CVE-2020-27257"
}
]
},
"description": {
"_id": null,
"data": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PSW files by the CX-Protocol application. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27257"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "VULHUB",
"id": "VHN-370737"
}
],
"trust": 2.34
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-27257",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-21-007-02",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-21-184",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVNVU95231601",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11809",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2021.0077",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-370737",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "VULHUB",
"id": "VHN-370737"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
},
{
"db": "NVD",
"id": "CVE-2020-27257"
}
]
},
"id": "VAR-202102-0316",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-370737"
}
],
"trust": 0.6681076499999999
},
"last_update_date": "2024-11-23T22:47:42.485000Z",
"patch": {
"_id": null,
"data": [
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
},
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"title": "Omron Repair measures for buffer errors and vulnerabilities in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138532"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-843",
"trust": 1.9
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-822",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-370737"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27257"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.8,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-184/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu95231601"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-184"
},
{
"db": "VULHUB",
"id": "VHN-370737"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
},
{
"db": "NVD",
"id": "CVE-2020-27257"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-184",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-370737",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-423",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-27257",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-184",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "VULHUB",
"id": "VHN-370737",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-01-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-423",
"ident": null
},
{
"date": "2021-02-09T15:15:12.970000",
"db": "NVD",
"id": "CVE-2020-27257",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-184",
"ident": null
},
{
"date": "2021-02-12T00:00:00",
"db": "VULHUB",
"id": "VHN-370737",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-423",
"ident": null
},
{
"date": "2024-11-21T05:20:57.303000",
"db": "NVD",
"id": "CVE-2020-27257",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Made by OMRON CX-One Multiple vulnerabilities in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-423"
}
],
"trust": 0.6
}
}
VAR-202102-0317
Vulnerability from variot - Updated: 2024-11-23 22:47The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 ‥ * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 ‥ * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.60"
},
{
"_id": null,
"model": "cx-position",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.52"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.28"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.02"
},
{
"_id": null,
"model": "cx-position",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27259"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-position",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
}
],
"trust": 0.7
},
"cve": "CVE-2020-27259",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-27259",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-370741",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "Low",
"baseScore": 6.6,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 1.6,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-27259",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27259",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 1.6,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-27259",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2020-27259",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-405",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-370741",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "VULHUB",
"id": "VHN-370741"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
},
{
"db": "NVD",
"id": "CVE-2020-27259"
}
]
},
"description": {
"_id": null,
"data": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. - CVE-2020-27259 \u2025 * A third party causes a stack-based buffer overflow to execute arbitrary code remotely - CVE-2020-27261 \u2025 * A third party enters the crafted data and executes arbitrary code - CVE-2020-27257. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the current process. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27259"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "VULHUB",
"id": "VHN-370741"
}
],
"trust": 2.34
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-27259",
"trust": 3.2
},
{
"db": "ICS CERT",
"id": "ICSA-21-007-02",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-21-182",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVNVU95231601",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11807",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2021.0077",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-370741",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "VULHUB",
"id": "VHN-370741"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
},
{
"db": "NVD",
"id": "CVE-2020-27259"
}
]
},
"id": "VAR-202102-0317",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-370741"
}
],
"trust": 0.6681076499999999
},
"last_update_date": "2024-11-23T22:47:42.455000Z",
"patch": {
"_id": null,
"data": [
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
},
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"title": "Omron Various product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138518"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-822",
"trust": 1.8
},
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-843",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27259"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.8,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-182/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu95231601"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-182"
},
{
"db": "VULHUB",
"id": "VHN-370741"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
},
{
"db": "NVD",
"id": "CVE-2020-27259"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-182",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-370741",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-405",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-27259",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-182",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "VULHUB",
"id": "VHN-370741",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-01-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-405",
"ident": null
},
{
"date": "2021-02-09T15:15:13.097000",
"db": "NVD",
"id": "CVE-2020-27259",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-182",
"ident": null
},
{
"date": "2021-02-11T00:00:00",
"db": "VULHUB",
"id": "VHN-370741",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-405",
"ident": null
},
{
"date": "2024-11-21T05:20:57.497000",
"db": "NVD",
"id": "CVE-2020-27259",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Made by OMRON CX-One Multiple vulnerabilities in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-405"
}
],
"trust": 0.6
}
}
VAR-202102-0318
Vulnerability from variot - Updated: 2024-11-23 22:47The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. ‥ * Untrusted pointer reference (CWE-822) - CVE-2020-27259 ‥ * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 ‥ * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. ‥ * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 1.4,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.60"
},
{
"_id": null,
"model": "cx-position",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.52"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.28"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "2.02"
},
{
"_id": null,
"model": "cx-position",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.52"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 2.02"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.8,
"vendor": "omron",
"version": "\u30d0\u30fc\u30b8\u30e7\u30f3 5.0.28"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27261"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-position",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
}
],
"trust": 1.4
},
"cve": "CVE-2020-27261",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2020-27261",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-370745",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "Low",
"baseScore": 6.6,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 1.6,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2020-27261",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2020-27261",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA score",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001004",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 1.6,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2020-27261",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2020-27261",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2021-001004",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202101-408",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-370745",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "VULHUB",
"id": "VHN-370745"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
},
{
"db": "NVD",
"id": "CVE-2020-27261"
}
]
},
"description": {
"_id": null,
"data": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code. Provided by OMRON Corporation CX-One There are multiple vulnerabilities in. \u2025 * Untrusted pointer reference (CWE-822) - CVE-2020-27259 \u2025 * Stack-based buffer overflow (CWE-121) - CVE-2020-27261 \u2025 * Wrong type (CWE-843) - CVE-2020-27257The expected impact depends on each vulnerability, but it may be affected as follows. \u2025 * Any memory pointer is referenced by a third party and arbitrary code is executed remotely. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files by the CX-Position application. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. ARC, etc. are all products. ARC is a software package for creating and maintaining file archives. CX-Protocol is one of the components used to create a serial communication protocol to communicate with standard serial devices. Omron CX-One etc. are the products of Japan Omron (Omron) company. Omron CX-One is an integrated toolkit. The following products and versions are affected: CX-Protocol Versions 2.02 and prior, CX-Server Versions 5.0.28 and prior, CX-Position Versions 2.52 and prior",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27261"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "VULHUB",
"id": "VHN-370745"
}
],
"trust": 2.97
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2020-27261",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-21-007-02",
"trust": 2.5
},
{
"db": "ZDI",
"id": "ZDI-21-185",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-21-183",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVNVU95231601",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11810",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11808",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2021.0077",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-370745",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "VULHUB",
"id": "VHN-370745"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
},
{
"db": "NVD",
"id": "CVE-2020-27261"
}
]
},
"id": "VAR-202102-0318",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-370745"
}
],
"trust": 0.6681076499999999
},
"last_update_date": "2024-11-23T22:47:42.419000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.03 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | \u2212 \uff1aCX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-Position \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.2.53 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2021\u5e741\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_position"
},
{
"title": "Omron Repair measures for buffer errors and vulnerabilities in many products",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=138519"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-121",
"trust": 1.8
},
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-843",
"trust": 0.8
},
{
"problemtype": "CWE-822",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-370745"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "NVD",
"id": "CVE-2020-27261"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.5,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-185/"
},
{
"trust": 1.7,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-183/"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27257"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27259"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-27261"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu95231601"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.0077/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
},
{
"db": "VULHUB",
"id": "VHN-370745"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004"
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
},
{
"db": "NVD",
"id": "CVE-2020-27261"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-185",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-21-183",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-370745",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202101-408",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2020-27261",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-185",
"ident": null
},
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-183",
"ident": null
},
{
"date": "2021-02-09T00:00:00",
"db": "VULHUB",
"id": "VHN-370745",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-01-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-408",
"ident": null
},
{
"date": "2021-02-09T15:15:13.157000",
"db": "NVD",
"id": "CVE-2020-27261",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-185",
"ident": null
},
{
"date": "2021-02-10T00:00:00",
"db": "ZDI",
"id": "ZDI-21-183",
"ident": null
},
{
"date": "2021-02-11T00:00:00",
"db": "VULHUB",
"id": "VHN-370745",
"ident": null
},
{
"date": "2021-01-14T06:41:19",
"db": "JVNDB",
"id": "JVNDB-2021-001004",
"ident": null
},
{
"date": "2021-02-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202101-408",
"ident": null
},
{
"date": "2024-11-21T05:20:57.687000",
"db": "NVD",
"id": "CVE-2020-27261",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Omron CX-One NCI File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-185"
},
{
"db": "ZDI",
"id": "ZDI-21-183"
}
],
"trust": 1.4
},
"type": {
"_id": null,
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202101-408"
}
],
"trust": 0.6
}
}
VAR-201812-0479
Vulnerability from variot - Updated: 2024-11-23 22:45Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 1.4,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.66"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.23"
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.3,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.24"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.70"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
},
{
"db": "NVD",
"id": "CVE-2018-18993"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
}
]
},
"credits": {
"_id": null,
"data": "Esteban Ruiz (mr_me) of Source Incite",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
}
],
"trust": 1.4
},
"cve": "CVE-2018-18993",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-18993",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Complete",
"baseScore": 6.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Local",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Complete",
"baseScore": 5.2,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-25281",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "7d808751-463f-11e9-abf0-000c29342cb1",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-129608",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-18993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.4,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-18993",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "High",
"baseScore": 6.6,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "High",
"baseScore": 5.8,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-010184",
"trust": 1.6,
"value": "Medium"
},
{
"author": "ZDI",
"id": "CVE-2018-18993",
"trust": 1.4,
"value": "HIGH"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-18993",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-25281",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-128",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-129608",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2018-18993",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "VULHUB",
"id": "VHN-129608"
},
{
"db": "VULMON",
"id": "CVE-2018-18993"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
},
{
"db": "NVD",
"id": "CVE-2018-18993"
}
]
},
"description": {
"_id": null,
"data": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Position. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of project files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. Area. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18993"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-129608"
},
{
"db": "VULMON",
"id": "CVE-2018-18993"
}
],
"trust": 4.05
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-18993",
"trust": 5.1
},
{
"db": "ICS CERT",
"id": "ICSA-18-338-01",
"trust": 3.5
},
{
"db": "BID",
"id": "106106",
"trust": 2.7
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-25281",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU90473043",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-6610",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-1368",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-6603",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-1366",
"trust": 0.7
},
{
"db": "IVD",
"id": "7D808751-463F-11E9-ABF0-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-129608",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-18993",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "VULHUB",
"id": "VHN-129608"
},
{
"db": "VULMON",
"id": "CVE-2018-18993"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
},
{
"db": "NVD",
"id": "CVE-2018-18993"
}
]
},
"id": "VAR-201812-0479",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "VULHUB",
"id": "VHN-129608"
}
],
"trust": 1.449529875
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
}
]
},
"last_update_date": "2024-11-23T22:45:08.278000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 1.4,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "Omron CX-One Buffer Overflow Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/146977"
},
{
"title": "Omron CX-One Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87424"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-129608"
},
{
"db": "NVD",
"id": "CVE-2018-18993"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 5.0,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/106106"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu90473043/"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1368"
},
{
"db": "ZDI",
"id": "ZDI-18-1366"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
},
{
"db": "VULHUB",
"id": "VHN-129608"
},
{
"db": "VULMON",
"id": "CVE-2018-18993"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
},
{
"db": "NVD",
"id": "CVE-2018-18993"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-1368",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-1366",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-25281",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-129608",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2018-18993",
"ident": null
},
{
"db": "BID",
"id": "106106",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-18993",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-12-14T00:00:00",
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1",
"ident": null
},
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1368",
"ident": null
},
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1366",
"ident": null
},
{
"date": "2018-12-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25281",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "VULHUB",
"id": "VHN-129608",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "VULMON",
"id": "CVE-2018-18993",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "BID",
"id": "106106",
"ident": null
},
{
"date": "2018-12-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"date": "2018-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-128",
"ident": null
},
{
"date": "2018-12-04T22:29:00.340000",
"db": "NVD",
"id": "CVE-2018-18993",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1368",
"ident": null
},
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1366",
"ident": null
},
{
"date": "2018-12-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25281",
"ident": null
},
{
"date": "2020-09-18T00:00:00",
"db": "VULHUB",
"id": "VHN-129608",
"ident": null
},
{
"date": "2020-09-18T00:00:00",
"db": "VULMON",
"id": "CVE-2018-18993",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "BID",
"id": "106106",
"ident": null
},
{
"date": "2018-12-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"date": "2020-09-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-128",
"ident": null
},
{
"date": "2024-11-21T03:57:00.207000",
"db": "NVD",
"id": "CVE-2018-18993",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "BID",
"id": "106106"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "Omron CX-One Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25281"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "7d808751-463f-11e9-abf0-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-128"
}
],
"trust": 0.8
}
}
VAR-201812-0477
Vulnerability from variot - Updated: 2024-11-23 22:45In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.66"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.23"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.3,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.24"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.70"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
},
{
"db": "NVD",
"id": "CVE-2018-18989"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
}
]
},
"credits": {
"_id": null,
"data": "Esteban Ruiz (mr_me) of Source Incite",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1367"
}
],
"trust": 0.7
},
"cve": "CVE-2018-18989",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-18989",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Complete",
"baseScore": 6.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Local",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Complete",
"baseScore": 5.2,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 5.2,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 1.9,
"id": "CNVD-2018-25309",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 5.2,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 1.9,
"id": "7d806040-463f-11e9-aaa9-000c29342cb1",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:C",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-129603",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-18989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "High",
"baseScore": 6.6,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "High",
"baseScore": 5.8,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-010184",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-18989",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-010184",
"trust": 1.6,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-18989",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2018-18989",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-25309",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-127",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-129603",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "VULHUB",
"id": "VHN-129603"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
},
{
"db": "NVD",
"id": "CVE-2018-18989"
}
]
},
"description": {
"_id": null,
"data": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-18989"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-129603"
}
],
"trust": 3.33
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-18989",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-18-338-01",
"trust": 3.4
},
{
"db": "BID",
"id": "106106",
"trust": 2.6
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-25309",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU90473043",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-6608",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-1367",
"trust": 0.7
},
{
"db": "IVD",
"id": "7D806040-463F-11E9-AAA9-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-129603",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "VULHUB",
"id": "VHN-129603"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
},
{
"db": "NVD",
"id": "CVE-2018-18989"
}
]
},
"id": "VAR-201812-0477",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "VULHUB",
"id": "VHN-129603"
}
],
"trust": 1.449529875
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
}
]
},
"last_update_date": "2024-11-23T22:45:08.232000Z",
"patch": {
"_id": null,
"data": [
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9 | Ver.9.70 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9 | - : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e7412\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"title": "Omron CX-One Memory Error Reference Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/147093"
},
{
"title": "Omron CX-One Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87423"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-416",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-129603"
},
{
"db": "NVD",
"id": "CVE-2018-18989"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-338-01"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/106106"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu90473043/"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-1367"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
},
{
"db": "VULHUB",
"id": "VHN-129603"
},
{
"db": "BID",
"id": "106106"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
},
{
"db": "NVD",
"id": "CVE-2018-18989"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-1367",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-25309",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-129603",
"ident": null
},
{
"db": "BID",
"id": "106106",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-18989",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-12-14T00:00:00",
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1",
"ident": null
},
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1367",
"ident": null
},
{
"date": "2018-12-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25309",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "VULHUB",
"id": "VHN-129603",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "BID",
"id": "106106",
"ident": null
},
{
"date": "2018-12-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"date": "2018-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-127",
"ident": null
},
{
"date": "2018-12-04T22:29:00.277000",
"db": "NVD",
"id": "CVE-2018-18989",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-12-10T00:00:00",
"db": "ZDI",
"id": "ZDI-18-1367",
"ident": null
},
{
"date": "2018-12-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-25309",
"ident": null
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-129603",
"ident": null
},
{
"date": "2018-12-04T00:00:00",
"db": "BID",
"id": "106106",
"ident": null
},
{
"date": "2018-12-06T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-010184",
"ident": null
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-127",
"ident": null
},
{
"date": "2024-11-21T03:56:59.737000",
"db": "NVD",
"id": "CVE-2018-18989",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "BID",
"id": "106106"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
}
],
"trust": 0.9
},
"title": {
"_id": null,
"data": "Omron CX-One Memory Error Reference Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-25309"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Resource management error",
"sources": [
{
"db": "IVD",
"id": "7d806040-463f-11e9-aaa9-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-127"
}
],
"trust": 0.8
}
}
VAR-201804-1656
Vulnerability from variot - Updated: 2024-11-23 22:17Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
}
],
"trust": 0.7
},
"cve": "CVE-2018-7530",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-7530",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-7530",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07873",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-137562",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-7530",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-7530",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2018-7530",
"trust": 0.7,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2018-07873",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-791",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-137562",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7530"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-137562"
}
],
"trust": 3.33
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-7530",
"trust": 4.3
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.4
},
{
"db": "CNVD",
"id": "CNVD-2018-07873",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5404",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-283",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-137562",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"id": "VAR-201804-1656",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
}
]
},
"last_update_date": "2024-11-23T22:17:35.160000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Omron CX-One code execution hole patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126153"
},
{
"title": "Omron CX-One Fixes for multiple software security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80160"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-843",
"trust": 1.8
},
{
"problemtype": "CWE-118",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-122",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 4.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-283"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
},
{
"db": "VULHUB",
"id": "VHN-137562"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
},
{
"db": "NVD",
"id": "CVE-2018-7530"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"date": "2018-04-17T19:29:00.387000",
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-283",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07873",
"ident": null
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-137562",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-791",
"ident": null
},
{
"date": "2024-11-21T04:12:18.397000",
"db": "NVD",
"id": "CVE-2018-7530",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Omron CX-One Code execution hole",
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07873"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Code problem",
"sources": [
{
"db": "IVD",
"id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-791"
}
],
"trust": 0.8
}
}
VAR-201804-1567
Vulnerability from variot - Updated: 2024-11-23 22:17Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 2.8,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
}
],
"trust": 2.8
},
"cve": "CVE-2018-8834",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-8834",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 2.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-8834",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07871",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-138866",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-8834",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2018-8834",
"trust": 2.8,
"value": "MEDIUM"
},
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-8834",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-07871",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-790",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-138866",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2018-8834",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of NVF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-8834"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
}
],
"trust": 5.31
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-8834",
"trust": 6.5
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.5
},
{
"db": "CNVD",
"id": "CNVD-2018-07871",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5439",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-286",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5454",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-289",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5453",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-288",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5462",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-290",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EC2B30-39AB-11E9-8905-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-138866",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2018-8834",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"id": "VAR-201804-1567",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
}
]
},
"last_update_date": "2024-11-23T22:17:35.098000Z",
"patch": {
"_id": null,
"data": [
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "Omron CX-One heap buffer overflow vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126149"
},
{
"title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80159"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-122",
"trust": 1.8
},
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 0.8
},
{
"problemtype": "CWE-843",
"trust": 0.8
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 6.4,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-286"
},
{
"db": "ZDI",
"id": "ZDI-18-289"
},
{
"db": "ZDI",
"id": "ZDI-18-288"
},
{
"db": "ZDI",
"id": "ZDI-18-290"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
},
{
"db": "VULHUB",
"id": "VHN-138866"
},
{
"db": "VULMON",
"id": "CVE-2018-8834"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
},
{
"db": "NVD",
"id": "CVE-2018-8834"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"date": "2018-04-17T19:29:00.437000",
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-286",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-289",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-288",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-290",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07871",
"ident": null
},
{
"date": "2020-09-29T00:00:00",
"db": "VULHUB",
"id": "VHN-138866",
"ident": null
},
{
"date": "2020-09-29T00:00:00",
"db": "VULMON",
"id": "CVE-2018-8834",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2020-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-790",
"ident": null
},
{
"date": "2024-11-21T04:14:24.920000",
"db": "NVD",
"id": "CVE-2018-8834",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Omron CX-One Heap Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07871"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "e2ec2b30-39ab-11e9-8905-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-790"
}
],
"trust": 0.8
}
}
VAR-201804-1654
Vulnerability from variot - Updated: 2024-11-23 22:17Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 3.5,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "switch box utility",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.68"
},
{
"_id": null,
"model": "network configurator",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "3.63"
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "5.0.22"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.992"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "9.65"
},
{
"_id": null,
"model": "cx-one",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "4.42"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "eq",
"trust": 0.9,
"vendor": "omron",
"version": "1.00"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.00"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 9.65"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.992"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 5.0.22"
},
{
"_id": null,
"model": "network configurator",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 3.63"
},
{
"_id": null,
"model": "switch box utility",
"scope": "lte",
"trust": 0.8,
"vendor": "omron",
"version": "version 1.68"
},
{
"_id": null,
"model": "cx-flnet",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-protocol",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-programmer",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "network configurator",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "switch box utility",
"scope": null,
"trust": 0.6,
"vendor": "omron",
"version": null
},
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 0.6,
"vendor": "omron",
"version": "\u003c=4.42"
},
{
"_id": null,
"model": "switch box utility",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.69"
},
{
"_id": null,
"model": "network configurator",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "3.64"
},
{
"_id": null,
"model": "cx-server",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "5.0.23"
},
{
"_id": null,
"model": "cx-protocol",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.993"
},
{
"_id": null,
"model": "cx-programmer",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "9.66"
},
{
"_id": null,
"model": "cx-flnet",
"scope": "ne",
"trust": 0.3,
"vendor": "omron",
"version": "1.10"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx flnet",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx one",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx programmer",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx protocol",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "cx server",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "network configurator",
"version": "*"
},
{
"_id": null,
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "switch box utility",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:omron:cx-flnet",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-programmer",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-protocol",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:cx-server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:network_configurator",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:omron:switch_box_utility",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
}
],
"trust": 3.5
},
"cve": "CVE-2018-7514",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-7514",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 3.5,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "JPCERT/CC",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 2.4,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-7514",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-07872",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-137546",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "JPCERT/CC",
"availabilityImpact": "Low",
"baseScore": 5.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2018-002441",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 2.4,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-7514",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2018-7514",
"trust": 3.5,
"value": "MEDIUM"
},
{
"author": "JPCERT/CC",
"id": "JVNDB-2018-002441",
"trust": 2.4,
"value": "Medium"
},
{
"author": "nvd@nist.gov",
"id": "CVE-2018-7514",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-07872",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201804-792",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-137546",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"description": {
"_id": null,
"data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities:\n1. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-7514"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-137546"
}
],
"trust": 5.85
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2018-7514",
"trust": 7.1
},
{
"db": "ICS CERT",
"id": "ICSA-18-100-02",
"trust": 3.4
},
{
"db": "CNVD",
"id": "CNVD-2018-07872",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU95484528",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5440",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-287",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5402",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-281",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5405",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-284",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5403",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-282",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-5406",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-18-285",
"trust": 0.7
},
{
"db": "BID",
"id": "103970",
"trust": 0.3
},
{
"db": "IVD",
"id": "E2EC0421-39AB-11E9-BCD0-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-137546",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"id": "VAR-201804-1654",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
}
],
"trust": 1.502235625
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
}
]
},
"last_update_date": "2024-11-23T22:17:35.032000Z",
"patch": {
"_id": null,
"data": [
{
"title": "OMRON has issued an update to correct this vulnerability.",
"trust": 3.5,
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
},
{
"title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
},
{
"title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
},
{
"title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
},
{
"title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
},
{
"title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
},
{
"title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
},
{
"title": "Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/126151"
},
{
"title": "Omron CX-One Fixes for multiple software buffer error vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-121",
"trust": 1.8
},
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-122",
"trust": 0.8
},
{
"problemtype": "CWE-843",
"trust": 0.8
},
{
"problemtype": "CWE-119",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 6.9,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu95484528/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
},
{
"trust": 0.3,
"url": "https://industrial.omron.eu/"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-18-287"
},
{
"db": "ZDI",
"id": "ZDI-18-281"
},
{
"db": "ZDI",
"id": "ZDI-18-284"
},
{
"db": "ZDI",
"id": "ZDI-18-282"
},
{
"db": "ZDI",
"id": "ZDI-18-285"
},
{
"db": "CNVD",
"id": "CNVD-2018-07872"
},
{
"db": "VULHUB",
"id": "VHN-137546"
},
{
"db": "BID",
"id": "103970"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
},
{
"db": "NVD",
"id": "CVE-2018-7514"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"db": "BID",
"id": "103970",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2018-04-19T00:00:00",
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"date": "2018-04-17T00:00:00",
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-04-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2018-04-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"date": "2018-04-17T19:29:00.340000",
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-287",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-281",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-284",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-282",
"ident": null
},
{
"date": "2018-04-11T00:00:00",
"db": "ZDI",
"id": "ZDI-18-285",
"ident": null
},
{
"date": "2018-04-19T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-07872",
"ident": null
},
{
"date": "2020-10-02T00:00:00",
"db": "VULHUB",
"id": "VHN-137546",
"ident": null
},
{
"date": "2018-04-10T00:00:00",
"db": "BID",
"id": "103970",
"ident": null
},
{
"date": "2018-08-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-002441",
"ident": null
},
{
"date": "2020-10-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201804-792",
"ident": null
},
{
"date": "2024-11-21T04:12:16.637000",
"db": "NVD",
"id": "CVE-2018-7514",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "OMRON CX-One Multiple vulnerabilities in applications included",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-002441"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "e2ec0421-39ab-11e9-bcd0-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201804-792"
}
],
"trust": 0.8
}
}
VAR-202105-0677
Vulnerability from variot - Updated: 2024-08-14 13:17Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan's Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "cx-one",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "4.60"
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 1.0,
"vendor": "omron",
"version": "5.0.29"
},
{
"_id": null,
"model": "cx-server",
"scope": null,
"trust": 0.8,
"vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"_id": null,
"model": "cx-server",
"scope": "lte",
"trust": 0.8,
"vendor": "\u30aa\u30e0\u30ed\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": "version 5.0.29.0 and earlier"
},
{
"_id": null,
"model": "cx-one",
"scope": null,
"trust": 0.7,
"vendor": "omron",
"version": null
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "NVD",
"id": "CVE-2021-27413"
}
]
},
"credits": {
"_id": null,
"data": "rgod",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
}
],
"trust": 0.7
},
"cve": "CVE-2021-27413",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2021-27413",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-386680",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-27413",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001399",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2021-27413",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 0.7,
"userInteraction": "REQUIRED",
"vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-27413",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2021-001399",
"trust": 0.8,
"value": "High"
},
{
"author": "ZDI",
"id": "CVE-2021-27413",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202105-706",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-386680",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-27413",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "VULHUB",
"id": "VHN-386680"
},
{
"db": "VULMON",
"id": "CVE-2021-27413"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706"
},
{
"db": "NVD",
"id": "CVE-2021-27413"
}
]
},
"description": {
"_id": null,
"data": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of NCI files in the CX-Position application. When parsing the B_PLC_NAME element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Omron CX-One is a set of integrated tool kits of Japan\u0027s Omron (Omron) company. The product includes frequency converter, temperature controller and PLC programming software, etc. There are security holes in CX-One Versions 4.60 and earlier",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-27413"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "VULHUB",
"id": "VHN-386680"
},
{
"db": "VULMON",
"id": "CVE-2021-27413"
}
],
"trust": 2.97
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2021-27413",
"trust": 3.3
},
{
"db": "ICS CERT",
"id": "ICSA-21-131-01",
"trust": 2.6
},
{
"db": "ZDI",
"id": "ZDI-21-588",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVNVU90806326",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11845",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706",
"trust": 0.7
},
{
"db": "CS-HELP",
"id": "SB2021041363",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021051204",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.1586",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-386680",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-27413",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "VULHUB",
"id": "VHN-386680"
},
{
"db": "VULMON",
"id": "CVE-2021-27413"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706"
},
{
"db": "NVD",
"id": "CVE-2021-27413"
}
]
},
"id": "VAR-202105-0677",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-386680"
}
],
"trust": 0.6495298749999999
},
"last_update_date": "2024-08-14T13:17:27.833000Z",
"patch": {
"_id": null,
"data": [
{
"title": "CX-One\u00a0 Version upgrade \u00a0 program \u00a0 download OMRON",
"trust": 0.8,
"url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
},
{
"title": "Omron has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
},
{
"title": "Omron CX-One Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151570"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
},
{
"problemtype": "CWE-121",
"trust": 1.0
},
{
"problemtype": "Stack-based buffer overflow (CWE-121) [IPA Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-386680"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "NVD",
"id": "CVE-2021-27413"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 3.9,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
},
{
"trust": 2.5,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-588/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90806326"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021041363"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.1586"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021051204"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/787.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-588"
},
{
"db": "VULHUB",
"id": "VHN-386680"
},
{
"db": "VULMON",
"id": "CVE-2021-27413"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706"
},
{
"db": "NVD",
"id": "CVE-2021-27413"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "ZDI",
"id": "ZDI-21-588",
"ident": null
},
{
"db": "VULHUB",
"id": "VHN-386680",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2021-27413",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001399",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-202105-706",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2021-27413",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2021-05-13T00:00:00",
"db": "ZDI",
"id": "ZDI-21-588",
"ident": null
},
{
"date": "2021-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-386680",
"ident": null
},
{
"date": "2021-05-13T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27413",
"ident": null
},
{
"date": "2021-05-14T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-001399",
"ident": null
},
{
"date": "2021-04-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975",
"ident": null
},
{
"date": "2021-05-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-706",
"ident": null
},
{
"date": "2021-05-13T19:15:07.943000",
"db": "NVD",
"id": "CVE-2021-27413",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2021-05-13T00:00:00",
"db": "ZDI",
"id": "ZDI-21-588",
"ident": null
},
{
"date": "2021-05-21T00:00:00",
"db": "VULHUB",
"id": "VHN-386680",
"ident": null
},
{
"date": "2021-05-21T00:00:00",
"db": "VULMON",
"id": "CVE-2021-27413",
"ident": null
},
{
"date": "2021-05-14T06:59:00",
"db": "JVNDB",
"id": "JVNDB-2021-001399",
"ident": null
},
{
"date": "2021-04-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975",
"ident": null
},
{
"date": "2021-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-706",
"ident": null
},
{
"date": "2021-05-21T16:34:32.723000",
"db": "NVD",
"id": "CVE-2021-27413",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202105-706"
}
],
"trust": 0.6
},
"title": {
"_id": null,
"data": "Made by OMRON \u00a0CX-One\u00a0 Stack-based buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001399"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
}
],
"trust": 0.6
}
}
CVE-2021-27413 (GCVE-0-2021-27413)
Vulnerability from nvd – Published: 2021-05-13 18:56 – Updated: 2024-08-03 20:48- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Omron CX-One |
Affected:
CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:48:16.891Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T18:56:33",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2021-27413",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2021-27413",
"datePublished": "2021-05-13T18:56:33",
"dateReserved": "2021-02-19T00:00:00",
"dateUpdated": "2024-08-03T20:48:16.891Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27261 (GCVE-0-2020-27261)
Vulnerability from nvd – Published: 2021-02-09 14:09 – Updated: 2024-09-17 00:02- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.439Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:17",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27261",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27261",
"datePublished": "2021-02-09T14:09:34.782476Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-17T00:02:18.058Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27259 (GCVE-0-2020-27259)
Vulnerability from nvd – Published: 2021-02-09 14:09 – Updated: 2024-09-16 16:33- CWE-822 - UNTRUSTED POINTER DEREFERENCE CWE-822
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.396Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-822",
"description": "UNTRUSTED POINTER DEREFERENCE CWE-822",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:18",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27259",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "UNTRUSTED POINTER DEREFERENCE CWE-822"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27259",
"datePublished": "2021-02-09T14:09:11.732043Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-16T16:33:13.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27257 (GCVE-0-2020-27257)
Vulnerability from nvd – Published: 2021-02-09 14:10 – Updated: 2024-09-17 02:47- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.464Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:13",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27257",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27257",
"datePublished": "2021-02-09T14:10:19.507744Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-17T02:47:28.530Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18993 (GCVE-0-2018-18993)
Vulnerability from nvd – Published: 2018-12-04 22:00 – Updated: 2024-08-05 11:23- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CX-One (CX-Programmer and CX-Server) |
Affected:
CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:23:08.580Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One (CX-Programmer and CX-Server)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
],
"datePublic": "2018-12-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-06T10:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-18993",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One (CX-Programmer and CX-Server)",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106106"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-18993",
"datePublished": "2018-12-04T22:00:00",
"dateReserved": "2018-11-06T00:00:00",
"dateUpdated": "2024-08-05T11:23:08.580Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18989 (GCVE-0-2018-18989)
Vulnerability from nvd – Published: 2018-12-04 22:00 – Updated: 2024-08-05 11:23- CWE-416 - USE AFTER FREE CWE-416
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CX-One (CX-Programmer and CX-Server) |
Affected:
CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:23:08.511Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One (CX-Programmer and CX-Server)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
],
"datePublic": "2018-12-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "USE AFTER FREE CWE-416",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-06T10:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-18989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One (CX-Programmer and CX-Server)",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "USE AFTER FREE CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106106"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-18989",
"datePublished": "2018-12-04T22:00:00",
"dateReserved": "2018-11-06T00:00:00",
"dateUpdated": "2024-08-05T11:23:08.511Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8834 (GCVE-0-2018-8834)
Vulnerability from nvd – Published: 2018-04-17 19:00 – Updated: 2024-09-16 19:25- CWE-122 - HEAP-BASED BUFFER OVERFLOW CWE-122
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:02:26.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "HEAP-BASED BUFFER OVERFLOW CWE-122",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-8834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HEAP-BASED BUFFER OVERFLOW CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-8834",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-03-20T00:00:00",
"dateUpdated": "2024-09-16T19:25:23.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-7530 (GCVE-0-2018-7530)
Vulnerability from nvd – Published: 2018-04-17 19:00 – Updated: 2024-09-16 16:28- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:04.359Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7530",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T16:28:21.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-7514 (GCVE-0-2018-7514)
Vulnerability from nvd – Published: 2018-04-17 19:00 – Updated: 2024-09-16 23:35- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:03.779Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7514",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7514",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T23:35:36.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-27413 (GCVE-0-2021-27413)
Vulnerability from cvelistv5 – Published: 2021-05-13 18:56 – Updated: 2024-08-03 20:48- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Omron CX-One |
Affected:
CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T20:48:16.891Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T18:56:33",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2021-27413",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-588/"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2021-27413",
"datePublished": "2021-05-13T18:56:33",
"dateReserved": "2021-02-19T00:00:00",
"dateUpdated": "2024-08-03T20:48:16.891Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27257 (GCVE-0-2020-27257)
Vulnerability from cvelistv5 – Published: 2021-02-09 14:10 – Updated: 2024-09-17 02:47- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.464Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:13",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27257",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (\u0027TYPE CONFUSION\u0027) CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-184/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27257",
"datePublished": "2021-02-09T14:10:19.507744Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-17T02:47:28.530Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27261 (GCVE-0-2020-27261)
Vulnerability from cvelistv5 – Published: 2021-02-09 14:09 – Updated: 2024-09-17 00:02- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.439Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:17",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27261",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-183/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-185/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27261",
"datePublished": "2021-02-09T14:09:34.782476Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-17T00:02:18.058Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-27259 (GCVE-0-2020-27259)
Vulnerability from cvelistv5 – Published: 2021-02-09 14:09 – Updated: 2024-09-16 16:33- CWE-822 - UNTRUSTED POINTER DEREFERENCE CWE-822
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Omron | CX-One |
Affected:
unspecified , ≤ 4.60
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T16:11:36.396Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "4.60",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Protocol",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.02",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Server",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "5.0.28",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "CX-Position",
"vendor": "Omron",
"versions": [
{
"lessThanOrEqual": "2.52",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-01-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-822",
"description": "UNTRUSTED POINTER DEREFERENCE CWE-822",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-10T18:06:18",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
],
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
},
"title": "Omron CX-One",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2021-01-07T17:00:00.000Z",
"ID": "CVE-2020-27259",
"STATE": "PUBLIC",
"TITLE": "Omron CX-One"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "4.60"
}
]
}
},
{
"product_name": "CX-Protocol",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.02"
}
]
}
},
{
"product_name": "CX-Server",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.28"
}
]
}
},
{
"product_name": "CX-Position",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.52"
}
]
}
}
]
},
"vendor_name": "Omron"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "UNTRUSTED POINTER DEREFERENCE CWE-822"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-02"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-21-182/"
}
]
},
"source": {
"advisory": "ICSA-21-007-02",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-27259",
"datePublished": "2021-02-09T14:09:11.732043Z",
"dateReserved": "2020-10-19T00:00:00",
"dateUpdated": "2024-09-16T16:33:13.557Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18989 (GCVE-0-2018-18989)
Vulnerability from cvelistv5 – Published: 2018-12-04 22:00 – Updated: 2024-08-05 11:23- CWE-416 - USE AFTER FREE CWE-416
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CX-One (CX-Programmer and CX-Server) |
Affected:
CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:23:08.511Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One (CX-Programmer and CX-Server)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
],
"datePublic": "2018-12-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "USE AFTER FREE CWE-416",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-06T10:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-18989",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One (CX-Programmer and CX-Server)",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "USE AFTER FREE CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106106"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-18989",
"datePublished": "2018-12-04T22:00:00",
"dateReserved": "2018-11-06T00:00:00",
"dateUpdated": "2024-08-05T11:23:08.511Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-18993 (GCVE-0-2018-18993)
Vulnerability from cvelistv5 – Published: 2018-12-04 22:00 – Updated: 2024-08-05 11:23- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | CX-One (CX-Programmer and CX-Server) |
Affected:
CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T11:23:08.580Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CX-One (CX-Programmer and CX-Server)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
],
"datePublic": "2018-12-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-06T10:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/106106"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-18993",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CX-One (CX-Programmer and CX-Server)",
"version": {
"version_data": [
{
"version_value": "CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Two stack-based buffer overflow vulnerabilities have been discovered in CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior). When processing project files, the application allows input data to exceed the buffer. An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01"
},
{
"name": "106106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/106106"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-18993",
"datePublished": "2018-12-04T22:00:00",
"dateReserved": "2018-11-06T00:00:00",
"dateUpdated": "2024-08-05T11:23:08.580Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-7530 (GCVE-0-2018-7530)
Vulnerability from cvelistv5 – Published: 2018-04-17 19:00 – Updated: 2024-09-16 16:28- CWE-843 - ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:04.359Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-843",
"description": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7530",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION) CWE-843"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7530",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T16:28:21.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-7514 (GCVE-0-2018-7514)
Vulnerability from cvelistv5 – Published: 2018-04-17 19:00 – Updated: 2024-09-16 23:35- CWE-121 - STACK-BASED BUFFER OVERFLOW CWE-121
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:31:03.779Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "STACK-BASED BUFFER OVERFLOW CWE-121",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-7514",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "STACK-BASED BUFFER OVERFLOW CWE-121"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-7514",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-02-26T00:00:00",
"dateUpdated": "2024-09-16T23:35:36.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8834 (GCVE-0-2018-8834)
Vulnerability from cvelistv5 – Published: 2018-04-17 19:00 – Updated: 2024-09-16 19:25- CWE-122 - HEAP-BASED BUFFER OVERFLOW CWE-122
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ICS-CERT | Omron CX-One |
Affected:
The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:02:26.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Omron CX-One",
"vendor": "ICS-CERT",
"versions": [
{
"status": "affected",
"version": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
],
"datePublic": "2018-04-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "HEAP-BASED BUFFER OVERFLOW CWE-122",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-17T18:57:01",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"DATE_PUBLIC": "2018-04-17T00:00:00",
"ID": "CVE-2018-8834",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Omron CX-One",
"version": {
"version_data": [
{
"version_value": "The following versions of CX-One are affected: CX-One Versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior."
}
]
}
}
]
},
"vendor_name": "ICS-CERT"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "HEAP-BASED BUFFER OVERFLOW CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-8834",
"datePublished": "2018-04-17T19:00:00Z",
"dateReserved": "2018-03-20T00:00:00",
"dateUpdated": "2024-09-16T19:25:23.504Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}