ID

VAR-201812-0477


CVE

CVE-2018-18989


TITLE

Omron CX-One Memory Error Reference Vulnerability

Trust: 0.8

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // CNVD: CNVD-2018-25309

DESCRIPTION

In CX-One Versions 4.42 and prior (CX-Programmer Versions 9.66 and prior and CX-Server Versions 5.0.23 and prior), when processing project files, the application fails to check if it is referencing freed memory. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One CX-Programmer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The issue results from the lack of validating the existence of an object prior to performing operations on the object. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Programmer is one of the PLC programming software. CX-Server is one of the driver management tools. A memory error reference vulnerability exists in Omron CX-One 4.42 and earlier (CX-Programmer 9.66 and earlier and CX-Server 5.0.23 and earlier). The vulnerability stems from a failure to check if the program is processing a project file. Reference the memory that was released. Omron CX-One is prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2

Trust: 3.33

sources: NVD: CVE-2018-18989 // JVNDB: JVNDB-2018-010184 // ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // BID: 106106 // IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // VULHUB: VHN-129603

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // CNVD: CNVD-2018-25309

AFFECTED PRODUCTS

vendor:omronmodel:cx-onescope:lteversion:4.42

Trust: 1.0

vendor:omronmodel:cx-programmerscope:lteversion:9.66

Trust: 1.0

vendor:omronmodel:cx-serverscope:lteversion:5.0.23

Trust: 1.0

vendor:omronmodel:cx-serverscope:eqversion:5.0.23

Trust: 0.9

vendor:omronmodel:cx-programmerscope:eqversion:9.66

Trust: 0.9

vendor:omronmodel:cx-onescope:eqversion:4.42

Trust: 0.9

vendor:omronmodel:cx-programmerscope:lteversion:version 9.66

Trust: 0.8

vendor:omronmodel:cx-serverscope:lteversion:version 5.0.23

Trust: 0.8

vendor:omronmodel:cx-onescope: - version: -

Trust: 0.7

vendor:omronmodel:cx-onescope:lteversion:<=4.42

Trust: 0.6

vendor:omronmodel:cx-serverscope:eqversion:5.0.22

Trust: 0.3

vendor:omronmodel:cx-programmerscope:eqversion:9.65

Trust: 0.3

vendor:omronmodel:cx-serverscope:neversion:5.0.24

Trust: 0.3

vendor:omronmodel:cx-programmerscope:neversion:9.70

Trust: 0.3

vendor:cx onemodel: - scope:eqversion:*

Trust: 0.2

vendor:cx programmermodel: - scope:eqversion:*

Trust: 0.2

vendor:cx servermodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // BID: 106106 // JVNDB: JVNDB-2018-010184 // CNNVD: CNNVD-201812-127 // NVD: CVE-2018-18989

CVSS

SEVERITY

CVSSV2

CVSSV3

JPCERT/CC: JVNDB-2018-010184
value: MEDIUM

Trust: 1.6

nvd@nist.gov: CVE-2018-18989
value: HIGH

Trust: 1.0

ZDI: CVE-2018-18989
value: HIGH

Trust: 0.7

CNVD: CNVD-2018-25309
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201812-127
value: HIGH

Trust: 0.6

IVD: 7d806040-463f-11e9-aaa9-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-129603
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-18989
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

JPCERT/CC: JVNDB-2018-010184
severity: MEDIUM
baseScore: 6.1
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

JPCERT/CC: JVNDB-2018-010184
severity: MEDIUM
baseScore: 5.2
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-25309
severity: MEDIUM
baseScore: 5.2
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d806040-463f-11e9-aaa9-000c29342cb1
severity: MEDIUM
baseScore: 5.2
vectorString: AV:L/AC:H/AU:N/C:P/I:P/A:C
accessVector: LOCAL
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 1.9
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-129603
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-18989
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.0

JPCERT/CC: JVNDB-2018-010184
baseSeverity: MEDIUM
baseScore: 6.6
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

JPCERT/CC: JVNDB-2018-010184
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2018-18989
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // VULHUB: VHN-129603 // JVNDB: JVNDB-2018-010184 // JVNDB: JVNDB-2018-010184 // CNNVD: CNNVD-201812-127 // NVD: CVE-2018-18989

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

sources: VULHUB: VHN-129603 // NVD: CVE-2018-18989

THREAT TYPE

local

Trust: 0.9

sources: BID: 106106 // CNNVD: CNNVD-201812-127

TYPE

Resource management error

Trust: 0.8

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // CNNVD: CNNVD-201812-127

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010184

PATCH

title:CX-One バージョンアップ プログラム ダウンロードurl:https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html

Trust: 0.8

title:CX-Programmer の更新内容 | Ver.9.70 : CX-Oneオートアップデート(V4向け_2018年12月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer

Trust: 0.8

title:共通モジュール の更新内容 | - : CX-Oneオートアップデート(V4向け_2018年12月)url:https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module

Trust: 0.8

title:Omron has issued an update to correct this vulnerability.url:https://ics-cert.us-cert.gov/advisories/ICSA-18-338-01

Trust: 0.7

title:Omron CX-One Memory Error Reference Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/147093

Trust: 0.6

title:Omron CX-One Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87423

Trust: 0.6

sources: ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // JVNDB: JVNDB-2018-010184 // CNNVD: CNNVD-201812-127

EXTERNAL IDS

db:NVDid:CVE-2018-18989

Trust: 4.3

db:ICS CERTid:ICSA-18-338-01

Trust: 3.4

db:BIDid:106106

Trust: 2.6

db:CNNVDid:CNNVD-201812-127

Trust: 0.9

db:CNVDid:CNVD-2018-25309

Trust: 0.8

db:JVNid:JVNVU90473043

Trust: 0.8

db:JVNDBid:JVNDB-2018-010184

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-6608

Trust: 0.7

db:ZDIid:ZDI-18-1367

Trust: 0.7

db:IVDid:7D806040-463F-11E9-AAA9-000C29342CB1

Trust: 0.2

db:VULHUBid:VHN-129603

Trust: 0.1

sources: IVD: 7d806040-463f-11e9-aaa9-000c29342cb1 // ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // VULHUB: VHN-129603 // BID: 106106 // JVNDB: JVNDB-2018-010184 // CNNVD: CNNVD-201812-127 // NVD: CVE-2018-18989

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-338-01

Trust: 4.1

url:http://www.securityfocus.com/bid/106106

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18993

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-18989

Trust: 0.8

url:https://jvn.jp/vu/jvnvu90473043/

Trust: 0.8

url:https://industrial.omron.eu/

Trust: 0.3

sources: ZDI: ZDI-18-1367 // CNVD: CNVD-2018-25309 // VULHUB: VHN-129603 // BID: 106106 // JVNDB: JVNDB-2018-010184 // CNNVD: CNNVD-201812-127 // NVD: CVE-2018-18989

CREDITS

Esteban Ruiz (mr_me) of Source Incite

Trust: 0.7

sources: ZDI: ZDI-18-1367

SOURCES

db:IVDid:7d806040-463f-11e9-aaa9-000c29342cb1
db:ZDIid:ZDI-18-1367
db:CNVDid:CNVD-2018-25309
db:VULHUBid:VHN-129603
db:BIDid:106106
db:JVNDBid:JVNDB-2018-010184
db:CNNVDid:CNNVD-201812-127
db:NVDid:CVE-2018-18989

LAST UPDATE DATE

2024-11-23T22:45:08.232000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-1367date:2018-12-10T00:00:00
db:CNVDid:CNVD-2018-25309date:2018-12-14T00:00:00
db:VULHUBid:VHN-129603date:2019-10-09T00:00:00
db:BIDid:106106date:2018-12-04T00:00:00
db:JVNDBid:JVNDB-2018-010184date:2018-12-06T00:00:00
db:CNNVDid:CNNVD-201812-127date:2019-10-17T00:00:00
db:NVDid:CVE-2018-18989date:2024-11-21T03:56:59.737

SOURCES RELEASE DATE

db:IVDid:7d806040-463f-11e9-aaa9-000c29342cb1date:2018-12-14T00:00:00
db:ZDIid:ZDI-18-1367date:2018-12-10T00:00:00
db:CNVDid:CNVD-2018-25309date:2018-12-14T00:00:00
db:VULHUBid:VHN-129603date:2018-12-04T00:00:00
db:BIDid:106106date:2018-12-04T00:00:00
db:JVNDBid:JVNDB-2018-010184date:2018-12-06T00:00:00
db:CNNVDid:CNNVD-201812-127date:2018-12-05T00:00:00
db:NVDid:CVE-2018-18989date:2018-12-04T22:29:00.277