ID

VAR-201906-0522


CVE

CVE-2019-12869


TITLE

plural PHOENIX CONTACT Product out-of-bounds vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-005774

DESCRIPTION

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of BCP files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. The Automation Worx Software Suite is an automation package from Phoenix Contact. Failed exploit attempts will likely cause a denial-of-service condition

Trust: 3.24

sources: NVD: CVE-2019-12869 // JVNDB: JVNDB-2019-005774 // ZDI: ZDI-19-579 // CNVD: CNVD-2019-41440 // BID: 108869 // IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9 // CNVD: CNVD-2019-41440

AFFECTED PRODUCTS

vendor:phoenixcontactmodel:automationworx software suitescope:lteversion:1.86

Trust: 1.0

vendor:phoenix contactmodel:automationworx software suitescope: - version: -

Trust: 0.8

vendor:phoenix contactmodel:automationworxscope: - version: -

Trust: 0.7

vendor:phoenixmodel:contact automation worx software suitescope:lteversion:<=1.86

Trust: 0.6

vendor:phoenixmodel:contact automation worx software suitescope:eqversion:1.86

Trust: 0.3

vendor:automationworx suitemodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9 // ZDI: ZDI-19-579 // CNVD: CNVD-2019-41440 // BID: 108869 // JVNDB: JVNDB-2019-005774 // NVD: CVE-2019-12869

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-12869
value: HIGH

Trust: 1.0

NVD: CVE-2019-12869
value: HIGH

Trust: 0.8

ZDI: CVE-2019-12869
value: LOW

Trust: 0.7

CNVD: CNVD-2019-41440
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-840
value: HIGH

Trust: 0.6

IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2019-12869
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-41440
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-12869
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

ZDI: CVE-2019-12869
baseSeverity: LOW
baseScore: 3.3
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.0

Trust: 0.7

sources: IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9 // ZDI: ZDI-19-579 // CNVD: CNVD-2019-41440 // JVNDB: JVNDB-2019-005774 // CNNVD: CNNVD-201906-840 // NVD: CVE-2019-12869

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.8

sources: JVNDB: JVNDB-2019-005774 // NVD: CVE-2019-12869

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-840

TYPE

Buffer error

Trust: 0.8

sources: IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9 // CNNVD: CNNVD-201906-840

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005774

PATCH

title:Top Pageurl:https://www.phoenixcontact.com/online/portal/pc?1dmy&urile=wcm%3apath%3a/pcen/web/home

Trust: 0.8

title:Phoenix Contact has issued an update to correct this vulnerability.url:https://cert.vde.com/en-us/advisories/vde-2019-014

Trust: 0.7

title:Automation Worx Software Suite PC Worx , PC Worx Express and Config+ Fix for component buffer error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93984

Trust: 0.6

sources: ZDI: ZDI-19-579 // JVNDB: JVNDB-2019-005774 // CNNVD: CNNVD-201906-840

EXTERNAL IDS

db:NVDid:CVE-2019-12869

Trust: 4.2

db:ZDIid:ZDI-19-579

Trust: 3.4

db:CERT@VDEid:VDE-2019-014

Trust: 2.4

db:ICS CERTid:ICSA-19-171-01

Trust: 2.3

db:ZDIid:ZDI-19-577

Trust: 0.9

db:ZDIid:ZDI-19-578

Trust: 0.9

db:ZDIid:ZDI-19-576

Trust: 0.9

db:ZDIid:ZDI-19-575

Trust: 0.9

db:BIDid:108869

Trust: 0.9

db:CNVDid:CNVD-2019-41440

Trust: 0.8

db:CNNVDid:CNNVD-201906-840

Trust: 0.8

db:JVNDBid:JVNDB-2019-005774

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-7781

Trust: 0.7

db:AUSCERTid:ESB-2019.2227

Trust: 0.6

db:IVDid:BDC8DD29-C7CD-4D62-B876-23E99CAC14D9

Trust: 0.2

sources: IVD: bdc8dd29-c7cd-4d62-b876-23e99cac14d9 // ZDI: ZDI-19-579 // CNVD: CNVD-2019-41440 // BID: 108869 // JVNDB: JVNDB-2019-005774 // CNNVD: CNNVD-201906-840 // NVD: CVE-2019-12869

REFERENCES

url:https://cert.vde.com/en-us/advisories/vde-2019-014

Trust: 3.1

url:https://www.zerodayinitiative.com/advisories/zdi-19-579/

Trust: 2.7

url:https://ics-cert.us-cert.gov/advisories/icsa-19-171-01

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-12869

Trust: 1.4

url:https://www.phoenixcontact.com/online/portal/pc

Trust: 0.9

url:https://www.zerodayinitiative.com/advisories/zdi-19-575/

Trust: 0.9

url:https://www.zerodayinitiative.com/advisories/zdi-19-578/

Trust: 0.9

url:https://www.zerodayinitiative.com/advisories/zdi-19-577/

Trust: 0.9

url:https://www.zerodayinitiative.com/advisories/zdi-19-576/

Trust: 0.9

url:https://dam-mdc.phoenixcontact.com/asset/156443151564/5fb7e8f696c4f9f9d893846d561b0bb6/security_advisory_automation-worx_cve-2019-12869-12871.pdf

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-12869

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-19-171-01

Trust: 0.8

url:https://www.securityfocus.com/bid/108869

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2227/

Trust: 0.6

sources: ZDI: ZDI-19-579 // CNVD: CNVD-2019-41440 // BID: 108869 // JVNDB: JVNDB-2019-005774 // CNNVD: CNNVD-201906-840 // NVD: CVE-2019-12869

CREDITS

9sg Security Team

Trust: 0.7

sources: ZDI: ZDI-19-579

SOURCES

db:IVDid:bdc8dd29-c7cd-4d62-b876-23e99cac14d9
db:ZDIid:ZDI-19-579
db:CNVDid:CNVD-2019-41440
db:BIDid:108869
db:JVNDBid:JVNDB-2019-005774
db:CNNVDid:CNNVD-201906-840
db:NVDid:CVE-2019-12869

LAST UPDATE DATE

2024-11-23T22:16:58.807000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-579date:2019-06-20T00:00:00
db:CNVDid:CNVD-2019-41440date:2019-11-20T00:00:00
db:BIDid:108869date:2019-06-20T00:00:00
db:JVNDBid:JVNDB-2019-005774date:2019-07-09T00:00:00
db:CNNVDid:CNNVD-201906-840date:2019-06-28T00:00:00
db:NVDid:CVE-2019-12869date:2024-11-21T04:23:44.580

SOURCES RELEASE DATE

db:IVDid:bdc8dd29-c7cd-4d62-b876-23e99cac14d9date:2019-11-20T00:00:00
db:ZDIid:ZDI-19-579date:2019-06-20T00:00:00
db:CNVDid:CNVD-2019-41440date:2019-11-20T00:00:00
db:BIDid:108869date:2019-06-20T00:00:00
db:JVNDBid:JVNDB-2019-005774date:2019-06-28T00:00:00
db:CNNVDid:CNNVD-201906-840date:2019-06-20T00:00:00
db:NVDid:CVE-2019-12869date:2019-06-24T16:15:15.167