ID

VAR-201402-0348


CVE

CVE-2014-0758


TITLE

Iconics GENESIS32 ActiveX Control Remote code execution vulnerability

Trust: 0.8

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-01214

DESCRIPTION

An ActiveX control in GenLaunch.htm in ICONICS GENESIS32 8.0, 8.02, 8.04, and 8.05 allows remote attackers to execute arbitrary programs via a crafted HTML document. GENESIS32 is a new generation of industrial control software developed by ICONICS. Iconics GENESIS32 is prone to a remote code-execution vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. GENESIS32 versions 8.0, 8.02, 8.04 and 8.05 are vulnerable

Trust: 2.61

sources: NVD: CVE-2014-0758 // JVNDB: JVNDB-2014-001458 // CNVD: CNVD-2014-01214 // BID: 65706 // IVD: 33a69fba-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-01214

AFFECTED PRODUCTS

vendor:iconicsmodel:genesis32scope:eqversion:8.05

Trust: 3.3

vendor:iconicsmodel:genesis32scope:eqversion:8.0

Trust: 3.3

vendor:iconicsmodel:genesis32scope:eqversion:8.02

Trust: 3.3

vendor:iconicsmodel:genesis32scope:eqversion:8.04

Trust: 3.3

vendor:iconicsmodel:genesis32scope:neversion:9.22

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.21

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.20

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.2

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.13

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.1

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.01

Trust: 0.3

vendor:iconicsmodel:genesis32scope:neversion:9.0

Trust: 0.3

vendor:genesis32model: - scope:eqversion:8.0

Trust: 0.2

vendor:genesis32model: - scope:eqversion:8.02

Trust: 0.2

vendor:genesis32model: - scope:eqversion:8.04

Trust: 0.2

vendor:genesis32model: - scope:eqversion:8.05

Trust: 0.2

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-01214 // BID: 65706 // JVNDB: JVNDB-2014-001458 // CNNVD: CNNVD-201402-351 // NVD: CVE-2014-0758

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0758
value: HIGH

Trust: 1.0

NVD: CVE-2014-0758
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01214
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201402-351
value: CRITICAL

Trust: 0.6

IVD: 33a69fba-2352-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2014-0758
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01214
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 33a69fba-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-01214 // JVNDB: JVNDB-2014-001458 // CNNVD: CNNVD-201402-351 // NVD: CVE-2014-0758

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2014-001458 // NVD: CVE-2014-0758

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201402-351

TYPE

Input validation

Trust: 0.8

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201402-351

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001458

PATCH

title:GENESIS32url:http://www.iconics.com/Home/Products/HMI-SCADA-Software-Solutions/GENESIS32.aspx

Trust: 0.8

title:Iconics GENESIS32 ActiveX Control Remote Code Execution Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/43839

Trust: 0.6

sources: CNVD: CNVD-2014-01214 // JVNDB: JVNDB-2014-001458

EXTERNAL IDS

db:NVDid:CVE-2014-0758

Trust: 3.5

db:ICS CERTid:ICSA-14-051-01

Trust: 3.3

db:BIDid:65706

Trust: 0.9

db:CNVDid:CNVD-2014-01214

Trust: 0.8

db:CNNVDid:CNNVD-201402-351

Trust: 0.8

db:JVNDBid:JVNDB-2014-001458

Trust: 0.8

db:SECUNIAid:57034

Trust: 0.6

db:IVDid:33A69FBA-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 33a69fba-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-01214 // BID: 65706 // JVNDB: JVNDB-2014-001458 // CNNVD: CNNVD-201402-351 // NVD: CVE-2014-0758

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-051-01

Trust: 3.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0758

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0758

Trust: 0.8

url:http://secunia.com/advisories/57034

Trust: 0.6

url:http://iconics.com/home/products/hmi-scada-software-solutions/genesis32.aspx

Trust: 0.3

url:http://iconics.com/iconicswebsite/media/documents/support%20downloads/whitepaper_security_vulnerabilities_february_19_2014.pdf

Trust: 0.3

sources: CNVD: CNVD-2014-01214 // BID: 65706 // JVNDB: JVNDB-2014-001458 // CNNVD: CNNVD-201402-351 // NVD: CVE-2014-0758

CREDITS

NCCIC/ICS-CERT

Trust: 0.3

sources: BID: 65706

SOURCES

db:IVDid:33a69fba-2352-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2014-01214
db:BIDid:65706
db:JVNDBid:JVNDB-2014-001458
db:CNNVDid:CNNVD-201402-351
db:NVDid:CVE-2014-0758

LAST UPDATE DATE

2024-11-23T22:46:07.694000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01214date:2014-02-25T00:00:00
db:BIDid:65706date:2014-02-20T00:00:00
db:JVNDBid:JVNDB-2014-001458date:2014-02-25T00:00:00
db:CNNVDid:CNNVD-201402-351date:2014-02-26T00:00:00
db:NVDid:CVE-2014-0758date:2024-11-21T02:02:45.437

SOURCES RELEASE DATE

db:IVDid:33a69fba-2352-11e6-abef-000c29c66e3ddate:2014-02-25T00:00:00
db:CNVDid:CNVD-2014-01214date:2014-02-25T00:00:00
db:BIDid:65706date:2014-02-20T00:00:00
db:JVNDBid:JVNDB-2014-001458date:2014-02-25T00:00:00
db:CNNVDid:CNNVD-201402-351date:2014-02-26T00:00:00
db:NVDid:CVE-2014-0758date:2014-02-24T04:48:10.193