ID

VAR-201807-0327


CVE

CVE-2018-10628


TITLE

AVEVA InTouch Buffer Overflow Vulnerability

Trust: 0.8

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNVD: CNVD-2018-14205

DESCRIPTION

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process. AVEVA InTouch 2014 and InTouch 2017 Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AVEVA InTouch is an embedded HMI software package from AVEVA Group plc, UK. The product provides read, write tag and event monitoring for HMI clients. There is a security hole in AVEVA InTouch. AVEVA InTouch is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will likely cause a denial-of-service condition

Trust: 2.61

sources: NVD: CVE-2018-10628 // JVNDB: JVNDB-2018-008931 // CNVD: CNVD-2018-14205 // BID: 104864 // IVD: 7d859062-463f-11e9-b3d3-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNVD: CNVD-2018-14205

AFFECTED PRODUCTS

vendor:avevamodel:intouch 2014scope:eqversion:r2

Trust: 1.6

vendor:avevamodel:intouch 2017scope:eqversion: -

Trust: 1.6

vendor:avevamodel:intouch 2014scope:lteversion:r2 sp1

Trust: 0.8

vendor:avevamodel:intouch 2017scope:eqversion:none

Trust: 0.8

vendor:avevamodel:intouch 2017scope:eqversion:update 1

Trust: 0.8

vendor:avevamodel:intouch 2017scope:eqversion:update 2

Trust: 0.8

vendor:intouch 2017model: - scope:eqversion: -

Trust: 0.6

vendor:avevamodel:intouch r2 sp1scope:lteversion:<=2014

Trust: 0.6

vendor:avevamodel:intouchscope:eqversion:2017

Trust: 0.6

vendor:avevamodel:intouch updatescope:eqversion:20171

Trust: 0.6

vendor:avevamodel:intouch updatescope:eqversion:20172

Trust: 0.6

vendor:intouch 2014model:r2scope: - version: -

Trust: 0.4

vendor:schneider electricmodel:aveva intouch updatescope:eqversion:20172

Trust: 0.3

vendor:schneider electricmodel:aveva intouch updatescope:eqversion:20171

Trust: 0.3

vendor:schneider electricmodel:aveva intouchscope:eqversion:2017

Trust: 0.3

vendor:schneider electricmodel:aveva intouch r2 sp1scope:eqversion:2014

Trust: 0.3

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNVD: CNVD-2018-14205 // BID: 104864 // JVNDB: JVNDB-2018-008931 // CNNVD: CNNVD-201807-1792 // NVD: CVE-2018-10628

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10628
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-10628
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-14205
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201807-1792
value: CRITICAL

Trust: 0.6

IVD: 7d859062-463f-11e9-b3d3-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2018-10628
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-14205
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d859062-463f-11e9-b3d3-000c29342cb1
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-10628
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNVD: CNVD-2018-14205 // JVNDB: JVNDB-2018-008931 // CNNVD: CNNVD-201807-1792 // NVD: CVE-2018-10628

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-121

Trust: 1.0

sources: JVNDB: JVNDB-2018-008931 // NVD: CVE-2018-10628

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201807-1792

TYPE

Buffer error

Trust: 0.8

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNNVD: CNNVD-201807-1792

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-008931

PATCH

title:AVEVA Security Bulletin LFSEC0000127url:https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec127(003).pdf

Trust: 0.8

title:Patch for AVEVA InTouch Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/135579

Trust: 0.6

title:AVEVA InTouch Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=82586

Trust: 0.6

sources: CNVD: CNVD-2018-14205 // JVNDB: JVNDB-2018-008931 // CNNVD: CNNVD-201807-1792

EXTERNAL IDS

db:NVDid:CVE-2018-10628

Trust: 3.5

db:ICS CERTid:ICSA-18-200-02

Trust: 2.7

db:BIDid:104864

Trust: 2.5

db:CNVDid:CNVD-2018-14205

Trust: 0.8

db:CNNVDid:CNNVD-201807-1792

Trust: 0.8

db:JVNDBid:JVNDB-2018-008931

Trust: 0.8

db:IVDid:7D859062-463F-11E9-B3D3-000C29342CB1

Trust: 0.2

sources: IVD: 7d859062-463f-11e9-b3d3-000c29342cb1 // CNVD: CNVD-2018-14205 // BID: 104864 // JVNDB: JVNDB-2018-008931 // CNNVD: CNNVD-201807-1792 // NVD: CVE-2018-10628

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-200-02

Trust: 2.7

url:http://www.securityfocus.com/bid/104864

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-10628

Trust: 1.4

url:https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/securitybulletin_lfsec127%28003%29.pdf

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10628

Trust: 0.8

url:https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/securitybulletin_lfsec127(003).pdf

Trust: 0.6

url:http://www.schneider-electric.com/products/ww/en/

Trust: 0.3

sources: CNVD: CNVD-2018-14205 // BID: 104864 // JVNDB: JVNDB-2018-008931 // CNNVD: CNNVD-201807-1792 // NVD: CVE-2018-10628

CREDITS

George Lashenko of CyberX.

Trust: 0.3

sources: BID: 104864

SOURCES

db:IVDid:7d859062-463f-11e9-b3d3-000c29342cb1
db:CNVDid:CNVD-2018-14205
db:BIDid:104864
db:JVNDBid:JVNDB-2018-008931
db:CNNVDid:CNNVD-201807-1792
db:NVDid:CVE-2018-10628

LAST UPDATE DATE

2024-11-23T21:38:45.857000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-14205date:2019-01-23T00:00:00
db:BIDid:104864date:2018-07-19T00:00:00
db:JVNDBid:JVNDB-2018-008931date:2018-11-01T00:00:00
db:CNNVDid:CNNVD-201807-1792date:2019-10-17T00:00:00
db:NVDid:CVE-2018-10628date:2024-11-21T03:41:41.730

SOURCES RELEASE DATE

db:IVDid:7d859062-463f-11e9-b3d3-000c29342cb1date:2018-07-30T00:00:00
db:CNVDid:CNVD-2018-14205date:2018-07-30T00:00:00
db:BIDid:104864date:2018-07-19T00:00:00
db:JVNDBid:JVNDB-2018-008931date:2018-11-01T00:00:00
db:CNNVDid:CNNVD-201807-1792date:2018-07-25T00:00:00
db:NVDid:CVE-2018-10628date:2018-07-24T18:29:00.233