VDE-2019-011
Vulnerability from csaf_pepperlfuchsse - Published: 2019-05-29 07:35 - Updated: 2019-10-07 10:00A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "A remote code execution vulnerability exists in **Remote Desktop Services** \u2013 formerly known as **Terminal Services** \u2013 when an unauthenticated attacker connects to the target system using **RDP** and sends specially crafted requests. \nThis vulnerability is **pre-authentication** and requires **no user interaction**. \nAn attacker who successfully exploits this vulnerability could execute arbitrary code on the target system.\n\nTo exploit this vulnerability, an attacker would need to send a specially crafted request to the target system\u0027s Remote Desktop Service via **RDP**.\n\n### Microsoft Advisories\n\n- [CVE-2019-0708](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708)\n- [CVE-2019-1181](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181)\n- [CVE-2019-1182](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182)",
"title": "Summary"
},
{
"category": "description",
"text": "- **VisuNet RM Shell 3 devices** based on a **Windows XP Embedded** system do not contain Remote Desktop Services. \n \u2192 Therefore, this vulnerability could not be used by an attacker.\n\n- **VisuNet RM Shell 4 devices** have Remote Desktop Services **disabled by default**. \n \u2192 The vulnerability could only be exploited if the device Administrator **enabled** Remote Desktop Services **after commissioning**.\n\n- **VisuNet PC devices** with **Windows XP, Windows 7, or Windows 10** \n \u2192 It should be verified whether Remote Desktop Services are **disabled**.\n\n- **Systems with enabled Network Level Authentication (NLA)** \n \u2192 Are only **partially affected**, as NLA requires authentication **before** the vulnerability can be triggered. \n \u2192 However, these systems are still **vulnerable to Remote Code Execution (RCE)** if the attacker has **valid credentials**.",
"title": "Impact"
},
{
"category": "description",
"text": "Customers using **Pepperl+Fuchs HMI devices** out of **VisuNet RM\\***, **VisuNet PC\\*** or **Box Thin Client BTC\\*** product families should follow these guidelines:\n\n- **Devices running Windows XP, Windows 7 or Windows 10** \n \u2192 Should be updated using the Windows Update mechanism.\n\n- **Devices running RM Shell 4 with enabled Remote Desktop Services** \n \u2192 Should be updated with the newest **RM Image 4 Security Patches 01/2017 to 09/2019 (18-33400G)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400) \n *Note: For RM Shell 4 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\n- **Devices running RM Shell 5 with enabled Remote Desktop Services** \n \u2192 Should be updated with **RM Image 5 Security Patches 09/2019 (18-33624E)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624) \n *Note: For RM Shell 5 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cert@pepperl-fuchs.com",
"name": "Pepperl+Fuchs SE",
"namespace": "https://www.pepperl-fuchs.com"
},
"references": [
{
"category": "self",
"summary": "VDE-2019-011: Pepperl+Fuchs: Remote code execution vulnerability in HMI devices - HTML",
"url": "https://certvde.com/en/advisories/VDE-2019-011/"
},
{
"category": "self",
"summary": "VDE-2019-011: Pepperl+Fuchs: Remote code execution vulnerability in HMI devices - CSAF",
"url": "https://pepperl-fuchs.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-011.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.pepperl-fuchs.com"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Pepperl+Fuchs SE",
"url": "https://certvde.com/en/advisories/vendor/pepperl-fuchs/"
}
],
"title": "Pepperl+Fuchs: Remote code execution vulnerability in HMI devices",
"tracking": {
"aliases": [
"VDE-2019-011"
],
"current_release_date": "2019-10-07T10:00:00.000Z",
"generator": {
"date": "2025-06-30T08:12:23.200Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.29"
}
},
"id": "VDE-2019-011",
"initial_release_date": "2019-05-29T07:35:00.000Z",
"revision_history": [
{
"date": "2019-05-29T07:35:00.000Z",
"number": "1.0.0",
"summary": "Initial revision."
},
{
"date": "2019-10-07T10:00:00.000Z",
"number": "1.1.0",
"summary": "The summary section was updated to include references to the newly relevant vulnerabilities CVE-2019-1181 and CVE-2019-1182.\nA previously included statement claiming that \"VisuNet RM Shell 5 devices and VisuNet PC devices running Windows 10 are not affected by this vulnerability\" was removed from the Impact section, as this information could no longer be confirmed.\nAdditionally, information regarding RM Shell 5 devices was added to the Solution section to provide updated mitigation guidance."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-11001"
}
}
],
"category": "product_name",
"name": "Box Thin Client BTC*"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "VisuNet PC* vers:all/*",
"product_id": "CSAFPID-11002"
}
}
],
"category": "product_name",
"name": "VisuNet PC*"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "VisuNet RM* vers:all/*",
"product_id": "CSAFPID-11003"
}
}
],
"category": "product_name",
"name": "VisuNet RM*"
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_name",
"name": "RM Shell 3",
"product": {
"name": "RM Shell 3",
"product_id": "CSAFPID-52001"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18-33400G",
"product": {
"name": "RM Shell 4 \u003c18-33400G",
"product_id": "CSAFPID-51002"
}
},
{
"category": "product_version",
"name": "18-33400G",
"product": {
"name": "RM Shell 4 18-33400G",
"product_id": "CSAFPID-52004"
}
},
{
"category": "product_name",
"name": "RDS disabled",
"product": {
"name": "RM Shell 4 RDS disabled",
"product_id": "CSAFPID-52002"
}
}
],
"category": "product_name",
"name": "RM Shell 4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18-33624E",
"product": {
"name": "RM Shell 5 \u003c18-33624E",
"product_id": "CSAFPID-51003"
}
},
{
"category": "product_version",
"name": "18-33624E",
"product": {
"name": "RM Shell 5 18-33624E",
"product_id": "CSAFPID-52005"
}
},
{
"category": "product_name",
"name": "RDS disabled",
"product": {
"name": "RM Shell 5 RDS disabled",
"product_id": "CSAFPID-52003"
}
}
],
"category": "product_name",
"name": "RM Shell 5"
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "Pepperl+Fuchs"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Windows XP",
"product": {
"name": "Windows XP",
"product_id": "CSAFPID-90001"
}
},
{
"category": "product_name",
"name": "Windows 7",
"product": {
"name": "Windows 7",
"product_id": "CSAFPID-90002"
}
},
{
"category": "product_name",
"name": "Windows 10",
"product": {
"name": "Windows 10",
"product_id": "CSAFPID-90003"
}
},
{
"category": "product_name",
"name": "Windows XP Embedded",
"product": {
"name": "Windows XP Embedded",
"product_id": "CSAFPID-90004"
}
}
],
"category": "product_family",
"name": "OS"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015"
],
"summary": "Affected products Shell 4."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012"
],
"summary": "Fixed products Shell 4."
},
{
"group_id": "CSAFGID-0004",
"product_ids": [
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
],
"summary": "Affected products Shell 5."
},
{
"group_id": "CSAFGID-0005",
"product_ids": [
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015"
],
"summary": "Fixed products Shell 5."
},
{
"group_id": "CSAFGID-0003",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
],
"summary": "Known not affected products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-90001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 7 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-90002",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 10 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-90003",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP Embedded installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-90004",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-90001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 7 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-90002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 10 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-90003",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP Embedded installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-90004",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-90001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 7 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-90002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows 10 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-90003",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Windows XP Embedded installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-90004",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 \u003c18-33400G installed with Windows 7 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-51002",
"relates_to_product_reference": "CSAFPID-31002"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 \u003c18-33400G installed with Windows 7 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-51002",
"relates_to_product_reference": "CSAFPID-31006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 \u003c18-33400G installed with Windows 7 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-51002",
"relates_to_product_reference": "CSAFPID-31010"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 \u003c18-33624E installed with Windows 10 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-51003",
"relates_to_product_reference": "CSAFPID-31003"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 \u003c18-33624E installed with Windows 10 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-51003",
"relates_to_product_reference": "CSAFPID-31007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 \u003c18-33624E installed with Windows 10 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-51003",
"relates_to_product_reference": "CSAFPID-31011"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 3 installed with Windows XP Embedded installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-52001",
"relates_to_product_reference": "CSAFPID-31004"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 3 installed with Windows XP Embedded installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-52001",
"relates_to_product_reference": "CSAFPID-31008"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 3 installed with Windows XP Embedded installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-52001",
"relates_to_product_reference": "CSAFPID-31012"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 RDS disabled installed with Windows 7 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-52002",
"relates_to_product_reference": "CSAFPID-31002"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 RDS disabled installed with Windows 7 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-52002",
"relates_to_product_reference": "CSAFPID-31006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 RDS disabled installed with Windows 7 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-52002",
"relates_to_product_reference": "CSAFPID-31010"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 RDS disabled installed with Windows 10 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-52003",
"relates_to_product_reference": "CSAFPID-31003"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 RDS disabled installed with Windows 10 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-52003",
"relates_to_product_reference": "CSAFPID-31007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 RDS disabled installed with Windows 10 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-52003",
"relates_to_product_reference": "CSAFPID-31011"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 18-33400G installed with Windows 7 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-32010"
},
"product_reference": "CSAFPID-52004",
"relates_to_product_reference": "CSAFPID-31002"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 18-33400G installed with Windows 7 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-32011"
},
"product_reference": "CSAFPID-52004",
"relates_to_product_reference": "CSAFPID-31006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 4 18-33400G installed with Windows 7 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-32012"
},
"product_reference": "CSAFPID-52004",
"relates_to_product_reference": "CSAFPID-31010"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 18-33624E installed with Windows 10 installed on Box Thin Client BTC* vers:all/*",
"product_id": "CSAFPID-32013"
},
"product_reference": "CSAFPID-52005",
"relates_to_product_reference": "CSAFPID-31003"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 18-33624E installed with Windows 10 installed on VisuNet PC* vers:all/*",
"product_id": "CSAFPID-32014"
},
"product_reference": "CSAFPID-52005",
"relates_to_product_reference": "CSAFPID-31007"
},
{
"category": "installed_with",
"full_product_name": {
"name": "RM Shell 5 18-33624E installed with Windows 10 installed on VisuNet RM* vers:all/*",
"product_id": "CSAFPID-32015"
},
"product_reference": "CSAFPID-52005",
"relates_to_product_reference": "CSAFPID-31011"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-1182",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Remote Desktop Services \u2013 formerly known as Terminal Services \u2013 when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nTo exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.\nThe update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015"
],
"known_affected": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
],
"known_not_affected": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 4 with enabled Remote Desktop Services** \n \u2192 Should be updated with the newest **RM Image 4 Security Patches 01/2017 to 09/2019 (18-33400G)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400) \n *Note: For RM Shell 4 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 5 with enabled Remote Desktop Services** \n \u2192 Should be updated with **RM Image 5 Security Patches 09/2019 (18-33624E)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624) \n *Note: For RM Shell 5 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
]
}
],
"title": "CVE-2019-1182"
},
{
"cve": "CVE-2019-0708",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Remote Desktop Services Remote Code Execution Vulnerability\u0027.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015"
],
"known_affected": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
],
"known_not_affected": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 4 with enabled Remote Desktop Services** \n \u2192 Should be updated with the newest **RM Image 4 Security Patches 01/2017 to 09/2019 (18-33400G)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400) \n *Note: For RM Shell 4 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 5 with enabled Remote Desktop Services** \n \u2192 Should be updated with **RM Image 5 Security Patches 09/2019 (18-33624E)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624) \n *Note: For RM Shell 5 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
]
}
],
"title": "CVE-2019-0708"
},
{
"cve": "CVE-2019-1181",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "description",
"text": "A remote code execution vulnerability exists in Remote Desktop Services \u2013 formerly known as Terminal Services \u2013 when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nTo exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.\nThe update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015"
],
"known_affected": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
],
"known_not_affected": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 4 with enabled Remote Desktop Services** \n \u2192 Should be updated with the newest **RM Image 4 Security Patches 01/2017 to 09/2019 (18-33400G)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33400) \n *Note: For RM Shell 4 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "- **Devices running RM Shell 5 with enabled Remote Desktop Services** \n \u2192 Should be updated with **RM Image 5 Security Patches 09/2019 (18-33624E)**: \n [https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624](https://www.pepperl-fuchs.com/cgi-bin/db/doci.pl/?ShowDocByDocNo=18-33624) \n *Note: For RM Shell 5 devices with disabled Remote Desktop Services (default commissioning state), this update is optional but recommended.*\n\nFor support, please contact your local Pepperl+Fuchs sales representative.",
"group_ids": [
"CSAFGID-0004"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018"
]
}
],
"title": "CVE-2019-1181"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.