ID

VAR-201804-1654


CVE

CVE-2018-7514


TITLE

OMRON CX-One Multiple vulnerabilities in applications included

Trust: 0.8

sources: JVNDB: JVNDB-2018-002441

DESCRIPTION

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of MCI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. A heap buffer overflow vulnerability exists in multiple softwares in Omron CX-One 4.42 and earlier. Omron CX-Supervisor is prone to the following security vulnerabilities: 1. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Trust: 5.85

sources: NVD: CVE-2018-7514 // JVNDB: JVNDB-2018-002441 // ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // BID: 103970 // IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // VULHUB: VHN-137546

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // CNVD: CNVD-2018-07872

AFFECTED PRODUCTS

vendor:omronmodel:cx-onescope: - version: -

Trust: 3.5

vendor:omronmodel:cx-onescope:lteversion:4.42

Trust: 1.0

vendor:omronmodel:cx-serverscope:lteversion:5.0.22

Trust: 1.0

vendor:omronmodel:network configuratorscope:lteversion:3.63

Trust: 1.0

vendor:omronmodel:cx-protocolscope:lteversion:1.992

Trust: 1.0

vendor:omronmodel:cx-flnetscope:lteversion:1.00

Trust: 1.0

vendor:omronmodel:cx-programmerscope:lteversion:9.65

Trust: 1.0

vendor:omronmodel:switch box utilityscope:lteversion:1.68

Trust: 1.0

vendor:omronmodel:switch box utilityscope:eqversion:1.68

Trust: 0.9

vendor:omronmodel:network configuratorscope:eqversion:3.63

Trust: 0.9

vendor:omronmodel:cx-serverscope:eqversion:5.0.22

Trust: 0.9

vendor:omronmodel:cx-protocolscope:eqversion:1.992

Trust: 0.9

vendor:omronmodel:cx-programmerscope:eqversion:9.65

Trust: 0.9

vendor:omronmodel:cx-onescope:eqversion:4.42

Trust: 0.9

vendor:omronmodel:cx-flnetscope:eqversion:1.00

Trust: 0.9

vendor:omronmodel:cx-flnetscope:lteversion:version 1.00

Trust: 0.8

vendor:omronmodel:cx-programmerscope:lteversion:version 9.65

Trust: 0.8

vendor:omronmodel:cx-protocolscope:lteversion:version 1.992

Trust: 0.8

vendor:omronmodel:cx-serverscope:lteversion:version 5.0.22

Trust: 0.8

vendor:omronmodel:network configuratorscope:lteversion:version 3.63

Trust: 0.8

vendor:omronmodel:switch box utilityscope:lteversion:version 1.68

Trust: 0.8

vendor:omronmodel:cx-flnetscope: - version: -

Trust: 0.6

vendor:omronmodel:cx-protocolscope: - version: -

Trust: 0.6

vendor:omronmodel:cx-programmerscope: - version: -

Trust: 0.6

vendor:omronmodel:cx-serverscope: - version: -

Trust: 0.6

vendor:omronmodel:network configuratorscope: - version: -

Trust: 0.6

vendor:omronmodel:switch box utilityscope: - version: -

Trust: 0.6

vendor:omronmodel:cx-onescope:lteversion:<=4.42

Trust: 0.6

vendor:omronmodel:switch box utilityscope:neversion:1.69

Trust: 0.3

vendor:omronmodel:network configuratorscope:neversion:3.64

Trust: 0.3

vendor:omronmodel:cx-serverscope:neversion:5.0.23

Trust: 0.3

vendor:omronmodel:cx-protocolscope:neversion:1.993

Trust: 0.3

vendor:omronmodel:cx-programmerscope:neversion:9.66

Trust: 0.3

vendor:omronmodel:cx-flnetscope:neversion:1.10

Trust: 0.3

vendor:cx flnetmodel: - scope:eqversion:*

Trust: 0.2

vendor:cx onemodel: - scope:eqversion:*

Trust: 0.2

vendor:cx programmermodel: - scope:eqversion:*

Trust: 0.2

vendor:cx protocolmodel: - scope:eqversion:*

Trust: 0.2

vendor:cx servermodel: - scope:eqversion:*

Trust: 0.2

vendor:network configuratormodel: - scope:eqversion:*

Trust: 0.2

vendor:switch box utilitymodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // BID: 103970 // JVNDB: JVNDB-2018-002441 // CNNVD: CNNVD-201804-792 // NVD: CVE-2018-7514

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2018-7514
value: MEDIUM

Trust: 3.5

JPCERT/CC: JVNDB-2018-002441
value: MEDIUM

Trust: 2.4

nvd@nist.gov: CVE-2018-7514
value: HIGH

Trust: 1.0

CNVD: CNVD-2018-07872
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201804-792
value: HIGH

Trust: 0.6

IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-137546
value: MEDIUM

Trust: 0.1

ZDI: CVE-2018-7514
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 3.5

JPCERT/CC: JVNDB-2018-002441
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.4

nvd@nist.gov: CVE-2018-7514
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2018-07872
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-137546
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

JPCERT/CC: JVNDB-2018-002441
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 2.4

nvd@nist.gov: CVE-2018-7514
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // VULHUB: VHN-137546 // JVNDB: JVNDB-2018-002441 // JVNDB: JVNDB-2018-002441 // JVNDB: JVNDB-2018-002441 // CNNVD: CNNVD-201804-792 // NVD: CVE-2018-7514

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.8

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 0.8

problemtype:CWE-843

Trust: 0.8

problemtype:CWE-119

Trust: 0.1

sources: VULHUB: VHN-137546 // JVNDB: JVNDB-2018-002441 // NVD: CVE-2018-7514

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201804-792

TYPE

Buffer error

Trust: 0.8

sources: IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // CNNVD: CNNVD-201804-792

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-002441

PATCH

title:OMRON has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02

Trust: 3.5

title:Network Configurator の更新内容: Ver.3.64 : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator

Trust: 0.8

title:SwitchBoxUtility の更新内容: Ver.1.69 : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility

Trust: 0.8

title:共通モジュール の更新内容: − : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module

Trust: 0.8

title:CX-FLnet の更新内容: Ver.1.10 : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet

Trust: 0.8

title:CX-One バージョンアップ プログラム ダウンロードurl:https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html

Trust: 0.8

title:CX-Programmer の更新内容: Ver.9.66 : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer

Trust: 0.8

title:CX-Protocol の更新内容: Ver.1.993 : CX-Oneオートアップデート(V4向け_2018年4月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol

Trust: 0.8

title:Patch for Omron CX-One Heap Buffer Overflow Vulnerability (CNVD-2018-07872)url:https://www.cnvd.org.cn/patchInfo/show/126151

Trust: 0.6

title:Omron CX-One Fixes for multiple software buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80161

Trust: 0.6

sources: ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // JVNDB: JVNDB-2018-002441 // CNNVD: CNNVD-201804-792

EXTERNAL IDS

db:NVDid:CVE-2018-7514

Trust: 7.1

db:ICS CERTid:ICSA-18-100-02

Trust: 3.4

db:CNVDid:CNVD-2018-07872

Trust: 0.8

db:CNNVDid:CNNVD-201804-792

Trust: 0.8

db:JVNid:JVNVU95484528

Trust: 0.8

db:JVNDBid:JVNDB-2018-002441

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-5440

Trust: 0.7

db:ZDIid:ZDI-18-287

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-5402

Trust: 0.7

db:ZDIid:ZDI-18-281

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-5405

Trust: 0.7

db:ZDIid:ZDI-18-284

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-5403

Trust: 0.7

db:ZDIid:ZDI-18-282

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-5406

Trust: 0.7

db:ZDIid:ZDI-18-285

Trust: 0.7

db:BIDid:103970

Trust: 0.3

db:IVDid:E2EC0421-39AB-11E9-BCD0-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-137546

Trust: 0.1

sources: IVD: e2ec0421-39ab-11e9-bcd0-000c29342cb1 // ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // VULHUB: VHN-137546 // BID: 103970 // JVNDB: JVNDB-2018-002441 // CNNVD: CNNVD-201804-792 // NVD: CVE-2018-7514

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-100-02

Trust: 6.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95484528/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7514

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-7530

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8834

Trust: 0.8

url:https://industrial.omron.eu/

Trust: 0.3

sources: ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285 // CNVD: CNVD-2018-07872 // VULHUB: VHN-137546 // BID: 103970 // JVNDB: JVNDB-2018-002441 // CNNVD: CNNVD-201804-792 // NVD: CVE-2018-7514

CREDITS

rgod

Trust: 3.5

sources: ZDI: ZDI-18-287 // ZDI: ZDI-18-281 // ZDI: ZDI-18-284 // ZDI: ZDI-18-282 // ZDI: ZDI-18-285

SOURCES

db:IVDid:e2ec0421-39ab-11e9-bcd0-000c29342cb1
db:ZDIid:ZDI-18-287
db:ZDIid:ZDI-18-281
db:ZDIid:ZDI-18-284
db:ZDIid:ZDI-18-282
db:ZDIid:ZDI-18-285
db:CNVDid:CNVD-2018-07872
db:VULHUBid:VHN-137546
db:BIDid:103970
db:JVNDBid:JVNDB-2018-002441
db:CNNVDid:CNNVD-201804-792
db:NVDid:CVE-2018-7514

LAST UPDATE DATE

2024-11-23T22:17:35.032000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-287date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-281date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-284date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-282date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-285date:2018-04-11T00:00:00
db:CNVDid:CNVD-2018-07872date:2018-04-19T00:00:00
db:VULHUBid:VHN-137546date:2020-10-02T00:00:00
db:BIDid:103970date:2018-04-10T00:00:00
db:JVNDBid:JVNDB-2018-002441date:2018-08-22T00:00:00
db:CNNVDid:CNNVD-201804-792date:2020-10-09T00:00:00
db:NVDid:CVE-2018-7514date:2024-11-21T04:12:16.637

SOURCES RELEASE DATE

db:IVDid:e2ec0421-39ab-11e9-bcd0-000c29342cb1date:2018-04-19T00:00:00
db:ZDIid:ZDI-18-287date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-281date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-284date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-282date:2018-04-11T00:00:00
db:ZDIid:ZDI-18-285date:2018-04-11T00:00:00
db:CNVDid:CNVD-2018-07872date:2018-04-19T00:00:00
db:VULHUBid:VHN-137546date:2018-04-17T00:00:00
db:BIDid:103970date:2018-04-10T00:00:00
db:JVNDBid:JVNDB-2018-002441date:2018-04-12T00:00:00
db:CNNVDid:CNNVD-201804-792date:2018-04-18T00:00:00
db:NVDid:CVE-2018-7514date:2018-04-17T19:29:00.340