All the vulnerabilites related to ICONICS - GENESIS64
cve-2022-29834
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64 |
Version: ICONICS GENESIS64 versions 10.97 to 10.97.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97 to 10.97.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:48:46", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-29834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97 to 10.97.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-29834", "datePublished": "2022-07-20T16:48:46", "dateReserved": "2022-04-27T00:00:00", "dateUpdated": "2024-08-03T06:33:42.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8300
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU93891820 | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04 | government-resource |
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | GENESIS64 |
Version: Version 10.97.2 Version: 10.97.2 CFR1 Version: 10.97.2 CRF2 Version: 10.97.3 |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "genesis64", "vendor": "iconics", "versions": [ { "status": "affected", "version": "10.97.2" }, { "status": "affected", "version": "10.97.2cfr1" }, { "status": "affected", "version": "10.97.2cfr2" }, { "status": "affected", "version": "10.97.3" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "genesis64", "vendor": "mitsubishielectric", "versions": [ { "status": "affected", "version": "10.97.2" }, { "status": "affected", "version": "10.97.2cfr1" }, { "status": "affected", "version": "10.97.2cfr2" }, { "status": "affected", "version": "10.97.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8300", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T18:50:37.535229Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T18:53:27.840Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "Version 10.97.2" }, { "status": "affected", "version": "10.97.2 CFR1" }, { "status": "affected", "version": "10.97.2 CRF2" }, { "status": "affected", "version": "10.97.3" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "Version 10.97.2" }, { "status": "affected", "version": "10.97.2 CFR1" }, { "status": "affected", "version": "10.97.2 CRF2" }, { "status": "affected", "version": "10.97.3" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Asher Davila of Palo Alto Networks" }, { "lang": "en", "type": "finder", "value": "Malav Vyas of Palo Alto Networks" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.\u003cbr\u003e" } ], "value": "Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Malicious Code Execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-561", "description": "CWE-561 Dead Code", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T05:21:38.917Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU93891820" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04" } ], "source": { "discovery": "UNKNOWN" }, "title": "Malicious Code Execution Vulnerability in GENESIS64", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-8300", "datePublished": "2024-11-28T22:18:28.358Z", "dateReserved": "2024-08-29T06:26:41.397Z", "dateUpdated": "2024-12-06T05:21:38.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8299
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU93891820 | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | GENESIS64 |
Version: all versions |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-8299", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T16:37:52.677330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T16:40:42.486Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Asher Davila of Palo Alto Networks" }, { "lang": "en", "type": "finder", "value": "Malav Vyas of Palo Alto Networks" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.\u003cbr\u003e" } ], "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Malicious Code Execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T05:18:03.652Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU93891820" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04" } ], "source": { "discovery": "UNKNOWN" }, "title": "Malicious Code Execution Vulnerability in GENESIS64 and MC Works64", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-8299", "datePublished": "2024-11-28T22:16:31.396Z", "dateReserved": "2024-08-29T06:26:34.979Z", "dateUpdated": "2024-12-06T05:18:03.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03 | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02%2C | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | MC Works64 |
Version: Version 4.02C (10.95.208.31) and earlier Version: all versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02%2C" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MC Works64", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 4.02C (10.95.208.31) and earlier" }, { "status": "affected", "version": "all versions" } ] }, { "product": "MC Works32", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 3.00A (9.50.255.02)" } ] }, { "product": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v10.96 and prior" } ] }, { "product": "GenBroker32", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v9.5 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "DESERIALIZATION OF UNTRUSTED DATA CWE-502", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T21:49:12", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02%2C" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MC Works64", "version": { "version_data": [ { "version_value": "Version 4.02C (10.95.208.31) and earlier" }, { "version_value": "all versions" } ] } }, { "product_name": "MC Works32", "version": { "version_data": [ { "version_value": "Version 3.00A (9.50.255.02)" } ] } } ] }, "vendor_name": "Mitsubishi Electric" }, { "product": { "product_data": [ { "product_name": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "version": { "version_data": [ { "version_value": "v10.96 and prior" } ] } }, { "product_name": "GenBroker32", "version": { "version_data": [ { "version_value": "v9.5 and prior" } ] } } ] }, "vendor_name": "ICONICS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DESERIALIZATION OF UNTRUSTED DATA CWE-502" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02,", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02," } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12007", "datePublished": "2020-07-16T21:49:12", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33320
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:21.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes." } ], "problemTypes": [ { "descriptions": [ { "description": "Deserialization of Untrusted Data", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:56:24", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33320", "datePublished": "2022-07-20T16:56:24", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:09:21.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-20-170-03 | x_refsource_CONFIRM | |
https://www.us-cert.gov/ics/advisories/icsa-20-170-02 | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | MC Works64 |
Version: version 4.02C (10.95.208.31) and earlier Version: all versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.726Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MC Works64", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "version 4.02C (10.95.208.31) and earlier" }, { "status": "affected", "version": "all versions" } ] }, { "product": "MC Works32", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "version 3.00A (9.50.255.02)" } ] }, { "product": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "version 10.96 and prior" } ] }, { "product": "GenBroker32", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "version 9.5 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "DESERIALIZATION OF UNTRUSTED DATA CWE-502", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T21:30:43", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MC Works64", "version": { "version_data": [ { "version_value": "version 4.02C (10.95.208.31) and earlier" }, { "version_value": "all versions" } ] } }, { "product_name": "MC Works32", "version": { "version_data": [ { "version_value": "version 3.00A (9.50.255.02)" } ] } } ] }, "vendor_name": "Mitsubishi Electric" }, { "product": { "product_data": [ { "product_name": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "version": { "version_data": [ { "version_value": "version 10.96 and prior" } ] } }, { "product_name": "GenBroker32", "version": { "version_data": [ { "version_value": "version 9.5 and prior" } ] } } ] }, "vendor_name": "ICONICS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DESERIALIZATION OF UNTRUSTED DATA CWE-502" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03", "refsource": "CONFIRM", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02", "refsource": "CONFIRM", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12015", "datePublished": "2020-07-16T21:30:43", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1238/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1236/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-378/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-22-473/ | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022, 2021, 2020, 2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:46.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1238/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1236/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound Read Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T16:06:28", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1238/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1236/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "version": { "version_data": [ { "version_value": "2022, 2021, 2020, 2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound Read Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1238/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1238/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1236/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1236/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-378/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-473/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27040", "datePublished": "2021-06-25T12:41:07", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:46.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9852
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU93891820 | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | GENESIS64 |
Version: all versions |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "genesis64", "vendor": "mitsubishielectric", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9852", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-29T18:39:20.927830Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-29T18:43:35.929Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Asher Davila of Palo Alto Networks" }, { "lang": "en", "type": "finder", "value": "Malav Vyas of Palo Alto Networks" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.\u003cbr\u003e" } ], "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Malicious Code Execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-06T05:23:50.441Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-010_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU93891820" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-04" } ], "source": { "discovery": "UNKNOWN" }, "title": "Malicious Code Execution Vulnerability in GENESIS64 and MC Works64", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-9852", "datePublished": "2024-11-28T22:20:28.303Z", "dateReserved": "2024-10-11T01:20:49.722Z", "dateUpdated": "2024-12-06T05:23:50.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33317
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:21.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes." } ], "problemTypes": [ { "descriptions": [ { "description": "Inclusion of Functionality from Untrusted Control Sphere", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:53:59", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Inclusion of Functionality from Untrusted Control Sphere" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33317", "datePublished": "2022-07-20T16:53:59", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:09:21.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02 | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03 | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | MC Works64 |
Version: 4.02C (10.95.208.31) and earlier Version: all versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MC Works64", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "4.02C (10.95.208.31) and earlier" }, { "status": "affected", "version": "all versions" } ] }, { "product": "MC Works32", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 3.00A (9.50.255.02)" } ] }, { "product": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v10.96 and prior" } ] }, { "product": "GenBroker32", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v9.5 and prior" } ] } ], "datePublic": "2020-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "DESERIALIZATION OF UNTRUSTED DATA CWE-502", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T19:39:24", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2020-06-18T15:00:00.000Z", "ID": "CVE-2020-12009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MC Works64", "version": { "version_data": [ { "version_value": "4.02C (10.95.208.31) and earlier" }, { "version_value": "all versions" } ] } }, { "product_name": "MC Works32", "version": { "version_data": [ { "version_value": "Version 3.00A (9.50.255.02)" } ] } } ] }, "vendor_name": "Mitsubishi Electric" }, { "product": { "product_data": [ { "product_name": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "version": { "version_data": [ { "version_value": "v10.96 and prior" } ] } }, { "product_name": "GenBroker32", "version": { "version_data": [ { "version_value": "v9.5 and prior" } ] } } ] }, "vendor_name": "ICONICS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DESERIALIZATION OF UNTRUSTED DATA CWE-502" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12009", "datePublished": "2020-07-16T19:39:24.072953Z", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-09-16T23:00:29.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23130
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU95403720/index.html | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian |
Version: Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01) Version: ICONICS GENESIS64 versions 10.97 and prior Version: ICONICS Hyper Historian versions 10.97 and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:19.772Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01)" }, { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97 and prior" }, { "status": "affected", "version": "ICONICS Hyper Historian versions 10.97 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Over-read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-21T18:17:30", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-23130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian", "version": { "version_data": [ { "version_value": "Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01)" }, { "version_value": "ICONICS GENESIS64 versions 10.97 and prior" }, { "version_value": "ICONICS Hyper Historian versions 10.97 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU95403720/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-23130", "datePublished": "2022-01-21T18:17:30", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-08-03T03:36:19.772Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23129
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jvn.jp/vu/JVNVU95403720/index.html | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01 | x_refsource_MISC | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Mitsubishi Electric MC Works64; ICONICS GENESIS64 |
Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior Version: ICONICS GENESIS64 versions 10.90 to 10.97 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:19.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MC Works64; ICONICS GENESIS64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" }, { "status": "affected", "version": "ICONICS GENESIS64 versions 10.90 to 10.97" } ] } ], "descriptions": [ { "lang": "en", "value": "Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information." } ], "problemTypes": [ { "descriptions": [ { "description": "Plaintext Storage of a Password", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-21T18:17:31", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-23129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MC Works64; ICONICS GENESIS64", "version": { "version_data": [ { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" }, { "version_value": "ICONICS GENESIS64 versions 10.90 to 10.97" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Plaintext Storage of a Password" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/vu/JVNVU95403720/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-23129", "datePublished": "2022-01-21T18:17:31", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-08-03T03:36:19.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33318
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:21.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server." } ], "problemTypes": [ { "descriptions": [ { "description": "Deserialization of Untrusted Data", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:57:38", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33318", "datePublished": "2022-07-20T16:57:38", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:09:21.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-7587
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-008_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU95548104 | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-296-01 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric Corporation | GENESIS64 |
Version: version 10.97.3 and prior |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThanOrEqual": "10.97.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7587", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:15:49.960141Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-06T15:50:04.628Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "version 10.97.3 and prior" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "version 10.97.3 and prior" } ] } ], "datePublic": "2024-10-22T03:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for ICONICS GENESIS64 version 10.97.3 and prior, Mitsubishi Electric GENESIS64 version 10.97.3 and prior and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to disclose or tamper with confidential information and data contained in the products, or cause a denial of service (DoS) condition on the products, by accessing a folder with incorrect permissions, when GenBroker32 is installed on the same PC as GENESIS64 or MC Works64." } ], "value": "Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for ICONICS GENESIS64 version 10.97.3 and prior, Mitsubishi Electric GENESIS64 version 10.97.3 and prior and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to disclose or tamper with confidential information and data contained in the products, or cause a denial of service (DoS) condition on the products, by accessing a folder with incorrect permissions, when GenBroker32 is installed on the same PC as GENESIS64 or MC Works64." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Information Disclosure, Information Tampering and Denial of Service (DoS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-22T22:19:20.646Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-008_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU95548104" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-296-01" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information Disclosure, Information Tampering and Denial of Service (DoS) Vulnerability in GENESIS64 and MC Works64", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-7587", "datePublished": "2024-10-22T22:19:20.646Z", "dateReserved": "2024-08-07T08:06:04.877Z", "dateUpdated": "2024-11-06T15:50:04.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33315
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:01:20.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes." } ], "problemTypes": [ { "descriptions": [ { "description": "Deserialization of Untrusted Data", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:55:13", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33315", "datePublished": "2022-07-20T16:55:13", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:01:20.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1573
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU98894016/ | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ICONICS | GENESIS64 |
Version: versions 10.97 to 10.97.2 |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThan": "10.97.92", "status": "affected", "version": "10.97", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1573", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T14:46:51.356597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T14:46:55.563Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:40:21.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "versions 10.97 to 10.97.2" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 10.97 to 10.97.2" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Authentication vulnerability in the mobile monitoring feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met:\u003cdiv\u003e\u003cul\u003e\u003cli\u003eActive Directory is used in the security setting.\u003c/li\u003e\u003cli\u003e\u201cAutomatic log in\u201d option is enabled in the security setting.\u003c/li\u003e\u003cli\u003eThe IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account.\u003c/li\u003e\u003cli\u003eThe IcoAnyGlass IIS Application Pool account is included in GENESIS64TM and MC Works64 Security and has permission to log in.\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e" } ], "value": "Improper Authentication vulnerability in the mobile monitoring feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting.\n * \u201cAutomatic log in\u201d option is enabled in the security setting.\n * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account.\n * The IcoAnyGlass IIS Application Pool account is included in GENESIS64TM and MC Works64 Security and has permission to log in." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-04T08:59:44.079Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-1573", "datePublished": "2024-07-04T08:59:44.079Z", "dateReserved": "2024-02-16T01:30:41.285Z", "dateUpdated": "2024-08-01T18:40:21.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1182
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU98894016/ | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ICONICS | GENESIS64 |
Version: all versions |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T18:33:24.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1182", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-19T15:23:47.078975Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-19T15:25:49.496Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code by storing a specially crafted DLL in a specific folder when GENESIS64 and MC Works64 are installed with the Pager agent in the alarm multi-agent notification feature." } ], "value": "Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code by storing a specially crafted DLL in a specific folder when GENESIS64 and MC Works64 are installed with the Pager agent in the alarm multi-agent notification feature." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Malicious Code Execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-04T08:53:41.217Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-1182", "datePublished": "2024-07-04T08:53:41.217Z", "dateReserved": "2024-02-02T00:20:48.886Z", "dateUpdated": "2024-08-19T15:25:49.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33316
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:21.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes." } ], "problemTypes": [ { "descriptions": [ { "description": "Deserialization of Untrusted Data", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:51:27", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Deserialization of Untrusted Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33316", "datePublished": "2022-07-20T16:51:27", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:09:21.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02 | x_refsource_MISC | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03 | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | n/a | Mitsubishi Electric MC Works64 |
Version: Version 4.02C (10.95.208.31) and earlier Version: all versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Version 4.02C (10.95.208.31) and earlier" }, { "status": "affected", "version": "all versions" } ] }, { "product": "MC Works32", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Version 3.00A (9.50.255.02)" } ] }, { "product": "ICONICS\u00a0 GenBroker64, Platform Services, Workbench, FrameWorX Server", "vendor": "n/a", "versions": [ { "status": "affected", "version": "v10.96 and prior" } ] }, { "product": "GenBroker32", "vendor": "n/a", "versions": [ { "status": "affected", "version": "v9.5 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition or allow remote code execution. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; GenBroker32 version 9.5 and prior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "OUT-OF-BOUNDS WRITE CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T18:53:05", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "Version 4.02C (10.95.208.31) and earlier" }, { "version_value": "all versions" } ] } }, { "product_name": "MC Works32", "version": { "version_data": [ { "version_value": "Version 3.00A (9.50.255.02)" } ] } }, { "product_name": "ICONICS\u00a0 GenBroker64, Platform Services, Workbench, FrameWorX Server", "version": { "version_data": [ { "version_value": "v10.96 and prior" } ] } }, { "product_name": "GenBroker32", "version": { "version_data": [ { "version_value": "v9.5 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition or allow remote code execution. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; GenBroker32 version 9.5 and prior." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OUT-OF-BOUNDS WRITE CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12011", "datePublished": "2020-07-16T18:53:05", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40264
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | ICONICS and Mitsubishi Electric Corporation | GENESIS64 |
Version: versions 10.96 to 10.97.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "tags": [ "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95858406/index.html" }, { "tags": [ "x_transferred" ], "url": "https://iconics.com/About/Security/CERT" }, { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS and Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 10.96 to 10.97.2" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker." } ], "value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T23:32:57.049Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "url": "https://jvn.jp/vu/JVNVU95858406/index.html" }, { "url": "https://iconics.com/About/Security/CERT" }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-01" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-40264", "datePublished": "2022-12-13T23:32:57.049Z", "dateReserved": "2022-09-08T19:40:16.930Z", "dateUpdated": "2024-08-03T12:14:40.199Z", "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12013
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02 | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03 | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Mitsubishi Electric | MC Works64 |
Version: Version 4.02C (10.95.208.31) and earlier Version: all versions |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:57.506Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MC Works64", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 4.02C (10.95.208.31) and earlier" }, { "status": "affected", "version": "all versions" } ] }, { "product": "MC Works32", "vendor": "Mitsubishi Electric", "versions": [ { "status": "affected", "version": "Version 3.00A (9.50.255.02)" } ] }, { "product": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v10.96 and prior" } ] }, { "product": "GenBroker32", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "v9.5 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "IMPROPER CONTROL OF GENERATION OF CODE (\u0027CODE INJECTION\u0027) CWE-94", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-16T21:14:34", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2020-12013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MC Works64", "version": { "version_data": [ { "version_value": "Version 4.02C (10.95.208.31) and earlier" }, { "version_value": "all versions" } ] } }, { "product_name": "MC Works32", "version": { "version_data": [ { "version_value": "Version 3.00A (9.50.255.02)" } ] } } ] }, "vendor_name": "Mitsubishi Electric" }, { "product": { "product_data": [ { "product_name": "GenBroker64, Platform Services, Workbench, FrameWorX Server", "version": { "version_data": [ { "version_value": "v10.96 and prior" } ] } }, { "product_name": "GenBroker32", "version": { "version_data": [ { "version_value": "v9.5 and prior" } ] } } ] }, "vendor_name": "ICONICS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER CONTROL OF GENERATION OF CODE (\u0027CODE INJECTION\u0027) CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03", "refsource": "CONFIRM", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2020-12013", "datePublished": "2020-07-16T21:14:34", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:57.506Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-1574
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf | vendor-advisory | |
https://jvn.jp/vu/JVNVU98894016/ | government-resource | |
https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03 | government-resource |
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ICONICS | GENESIS64 |
Version: versions 10.97 to 10.97.2 |
||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "genesis64", "vendor": "iconics", "versions": [ { "lessThan": "10.97.92", "status": "affected", "version": "10.97", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:mitsubishielectric:mc_works64:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "mc_works64", "vendor": "mitsubishielectric", "versions": [ { "lessThanOrEqual": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1574", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T14:44:19.238774Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T14:45:36.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T18:40:21.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "ICONICS", "versions": [ { "status": "affected", "version": "versions 10.97 to 10.97.2" } ] }, { "defaultStatus": "unaffected", "product": "GENESIS64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "versions 10.97 to 10.97.2" } ] }, { "defaultStatus": "unaffected", "product": "MC Works64", "vendor": "Mitsubishi Electric Corporation", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system." } ], "value": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "Malicious Code Execution" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-470", "description": "CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-04T09:02:35.260Z", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-004_en.pdf" }, { "tags": [ "government-resource" ], "url": "https://jvn.jp/vu/JVNVU98894016/" }, { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-03" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2024-1574", "datePublished": "2024-07-04T09:02:35.260Z", "dateReserved": "2024-02-16T01:30:45.960Z", "dateUpdated": "2024-08-01T18:40:21.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-23128
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jvn.jp/vu/JVNVU95403720/index.html | x_refsource_MISC | |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01 | x_refsource_MISC | |
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian; ICONICS AnalytiX; ICONICS MobileHMI |
Version: Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01) Version: ICONICS GENESIS64 versions 10.95.3 to 10.97 Version: ICONICS Hyper Historian versions 10.95.3 to 10.97 Version: ICONICS AnalytiX versions 10.95.3 to 10.97 Version: ICONICS MobileHMI versions 10.95.3 to 10.97 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:36:19.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian; ICONICS AnalytiX; ICONICS MobileHMI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01)" }, { "status": "affected", "version": "ICONICS GENESIS64 versions 10.95.3 to 10.97" }, { "status": "affected", "version": "ICONICS Hyper Historian versions 10.95.3 to 10.97" }, { "status": "affected", "version": "ICONICS AnalytiX versions 10.95.3 to 10.97" }, { "status": "affected", "version": "ICONICS MobileHMI versions 10.95.3 to 10.97" } ] } ], "descriptions": [ { "lang": "en", "value": "Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete List of Disallowed Inputs", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-21T18:17:33", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-23128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mitsubishi Electric MC Works64; ICONICS GENESIS64; ICONICS Hyper Historian; ICONICS AnalytiX; ICONICS MobileHMI", "version": { "version_data": [ { "version_value": "Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01)" }, { "version_value": "ICONICS GENESIS64 versions 10.95.3 to 10.97" }, { "version_value": "ICONICS Hyper Historian versions 10.95.3 to 10.97" }, { "version_value": "ICONICS AnalytiX versions 10.95.3 to 10.97" }, { "version_value": "ICONICS MobileHMI versions 10.95.3 to 10.97" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete List of Disallowed Inputs" } ] } ] }, "references": { "reference_data": [ { "name": "https://jvn.jp/vu/JVNVU95403720/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU95403720/index.html" }, { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01", "refsource": "MISC", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01" }, { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-23128", "datePublished": "2022-01-21T18:17:33", "dateReserved": "2022-01-11T00:00:00", "dateUpdated": "2024-08-03T03:36:19.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27041
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007 | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code" } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound Write Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-13T17:06:06", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "version": { "version_data": [ { "version_value": "2022.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound Write Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27041", "datePublished": "2021-06-25T12:41:13", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU96480474/index.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ICONICS GENESIS64; Mitsubishi Electric MC Works64 |
Version: ICONICS GENESIS64 versions 10.97.1 and prior Version: Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:21.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "vendor": "n/a", "versions": [ { "status": "affected", "version": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "status": "affected", "version": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T16:58:49", "orgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "shortName": "Mitsubishi" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "ID": "CVE-2022-33319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ICONICS GENESIS64; Mitsubishi Electric MC Works64", "version": { "version_data": [ { "version_value": "ICONICS GENESIS64 versions 10.97.1 and prior" }, { "version_value": "Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf", "refsource": "MISC", "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "name": "https://jvn.jp/vu/JVNVU96480474/index.html", "refsource": "MISC", "url": "https://jvn.jp/vu/JVNVU96480474/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0f77b61-78fd-4786-b3fb-1ee347a748ad", "assignerShortName": "Mitsubishi", "cveId": "CVE-2022-33319", "datePublished": "2022-07-20T16:58:49", "dateReserved": "2022-06-14T00:00:00", "dateUpdated": "2024-08-03T08:09:21.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202201-0603
Vulnerability from variot
Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products. Mitsubishi Electric products and multiple ICONICS There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring and control system (SCADA) of Japan's Mitsubishi Electric (Mitsubishi Electric).
A security vulnerability exists in Mitsubishi Electric MC Works64 that originates in the ICONICS and Mitsubishi Electric ICONICS product suites. The FrameWorX server in the Mitsubishi Electric MC Works64 product could allow an attacker to exploit the vulnerability to open a WebSocket endpoint (port 80 or 443) when bypassing GENESIS64 MC Works64 security. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0603", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mc works64", "scope": "gte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.201.23" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "mobilehmi", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "hyper historian", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "hyper historian", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.95.3" }, { "model": "genesis64", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.95.3" }, { "model": "mobilehmi", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.95.3" }, { "model": "analytix", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.95.3" }, { "model": "analytix", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "hyper historian", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "mc works64", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "4.00a (10.95.201.23) to 4.04e (10.95.210.01)" }, { "model": "mobilehmi", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "electric mc works64", "scope": "gte", "trust": 0.6, "vendor": "mitsubishi", "version": "10.95.201.23,\u003c=10.95.210.01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:analytix:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "versionStartIncluding": "10.95.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "versionStartIncluding": "10.95.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "versionStartIncluding": "10.95.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "versionStartIncluding": "10.95.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "versionStartIncluding": "10.95.201.23", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-23128" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS and Mitsubishi Electric reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1829" } ], "trust": 0.6 }, "cve": "CVE-2022-23128", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-23128", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-08358", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-23128", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-23128", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-08358", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-1829", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2022-23128", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products. Mitsubishi Electric products and multiple ICONICS There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring and control system (SCADA) of Japan\u0027s Mitsubishi Electric (Mitsubishi Electric). \n\r\n\r\nA security vulnerability exists in Mitsubishi Electric MC Works64 that originates in the ICONICS and Mitsubishi Electric ICONICS product suites. The FrameWorX server in the Mitsubishi Electric MC Works64 product could allow an attacker to exploit the vulnerability to open a WebSocket endpoint (port 80 or 443) when bypassing GENESIS64 MC Works64 security. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-23128", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-22-020-01", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU95403720", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2022-003883", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08358", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0311", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022012108", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-1829", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-23128", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "id": "VAR-202201-0603", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" } ] }, "last_update_date": "2024-02-13T22:46:25.925000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page Mitsubishi Electric Mitsubishi\u00a0Electric\u00a0Corporation", "trust": 0.8, "url": "https://iconics.com/" }, { "title": "Patch for Unknown Vulnerability in Mitsubishi Electric MC Works64", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/317671" }, { "title": "Mitsubishi Electric MC Works64 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=179152" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNNVD", "id": "CNNVD-202201-1829" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01" }, { "trust": 1.7, "url": "https://jvn.jp/vu/jvnvu95403720/index.html" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-026_en.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23128" }, { "trust": 1.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95403720/" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0311" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis64-four-vulnerabilities-37339" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022012108" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08358" }, { "db": "VULMON", "id": "CVE-2022-23128" }, { "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "db": "NVD", "id": "CVE-2022-23128" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-05T00:00:00", "db": "CNVD", "id": "CNVD-2022-08358" }, { "date": "2022-01-21T00:00:00", "db": "VULMON", "id": "CVE-2022-23128" }, { "date": "2023-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "date": "2022-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "date": "2022-01-21T19:15:09.977000", "db": "NVD", "id": "CVE-2022-23128" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2022-08358" }, { "date": "2022-01-27T00:00:00", "db": "VULMON", "id": "CVE-2022-23128" }, { "date": "2023-03-10T03:20:00", "db": "JVNDB", "id": "JVNDB-2022-003883" }, { "date": "2022-02-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1829" }, { "date": "2022-01-27T20:20:33.137000", "db": "NVD", "id": "CVE-2022-23128" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1829" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric products and multiple \u00a0ICONICS\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003883" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1829" } ], "trust": 0.6 } }
var-201105-0146
Vulnerability from variot
Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information. GENESIS32/64 is a new generation of industrial control software developed by ICONICS of the United States. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. The ICONICS WebHMI ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the 'GenVersion.dll' ActiveX control. Failed exploit attempts will result in a denial-of-service condition. "SetActiveXGUID()" method (GenVersion.dll) There is a boundary error. ----------------------------------------------------------------------
Secunia is hiring!
http://secunia.com/company/jobs/
TITLE: ICONICS VersionInfo ActiveX Control Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA44417
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44417/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44417
RELEASE DATE: 2011-05-04
DISCUSS ADVISORY: http://secunia.com/advisories/44417/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44417/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44417
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been discovered in ICONICS VersionInfo ActiveX control, which can be exploited by malicious people to compromise a user's system.
The vulnerability is confirmed in GenVersion.dll version 8.0.138.0. Other versions may also be affected.
SOLUTION: Update to a fixed version. Contact the vendor for further information.
PROVIDED AND/OR DISCOVERED BY: Scott Bell and Blair Strang, Security-Assessment.com
ORIGINAL ADVISORY: http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201105-0146", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "bizviz", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.2" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.20" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.13" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.01" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.0" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.1" }, { "model": "bizviz", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.0" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.2" }, { "model": "genesis32", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.21" }, { "model": "bizviz", "scope": "eq", "trust": 1.6, "vendor": "iconics", "version": "9.1" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "9.21" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "9.20" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "9.13" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "9.01" }, { "model": "bizviz", "scope": "eq", "trust": 0.8, "vendor": "iconics", "version": "9.x" }, { "model": "bizviz", "scope": "lt", "trust": 0.8, "vendor": "iconics", "version": "9.22" }, { "model": "genesis32", "scope": "lt", "trust": 0.8, "vendor": "iconics", "version": "9.22" }, { "model": "genesis32", "scope": "eq", "trust": 0.6, "vendor": "iconics", "version": "9.x" }, { "model": "versioninfo activex control", "scope": "eq", "trust": 0.6, "vendor": "iconics", "version": "8.x" }, { "model": "genesis64", "scope": "eq", "trust": 0.6, "vendor": "iconics", "version": "10.x" }, { "model": "pacis sui rc7", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "1.1" }, { "model": "pacis sui rc6", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "1.1" }, { "model": "webhmi activex control", "scope": "eq", "trust": 0.3, "vendor": "iconics", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.01" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.13" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "bizviz", "version": "9.21" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.01" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.13" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "genesis32", "version": "9.21" }, { "model": "genesis32", "scope": "eq", "trust": 0.2, "vendor": "iconics", "version": "9.x*" }, { "model": "versioninfo activex control", "scope": "eq", "trust": 0.2, "vendor": "iconics", "version": "8.x*" }, { "model": "genesis64", "scope": "eq", "trust": 0.2, "vendor": "iconics", "version": "10.x*" } ], "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "BID", "id": "47704" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-2089" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Scott Bell \u0026 Blair Strang", "sources": [ { "db": "BID", "id": "47704" } ], "trust": 0.3 }, "cve": "CVE-2011-2089", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2011-2089", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "f780befa-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C", "version": "2.0 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-2089", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201105-169", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information. GENESIS32/64 is a new generation of industrial control software developed by ICONICS of the United States. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. The ICONICS WebHMI ActiveX control is prone to a remote stack-based buffer-overflow vulnerability that affects the \u0027GenVersion.dll\u0027 ActiveX control. Failed exploit attempts will result in a denial-of-service condition. \"SetActiveXGUID()\" method (GenVersion.dll) There is a boundary error. ----------------------------------------------------------------------\n\n\nSecunia is hiring!\n\nhttp://secunia.com/company/jobs/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nICONICS VersionInfo ActiveX Control Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA44417\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44417/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44417\n\nRELEASE DATE:\n2011-05-04\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44417/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44417/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44417\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been discovered in ICONICS VersionInfo ActiveX\ncontrol, which can be exploited by malicious people to compromise a\nuser\u0027s system. \n\nThe vulnerability is confirmed in GenVersion.dll version 8.0.138.0. \nOther versions may also be affected. \n\nSOLUTION:\nUpdate to a fixed version. Contact the vendor for further\ninformation. \n\nPROVIDED AND/OR DISCOVERED BY:\nScott Bell and Blair Strang, Security-Assessment.com\n\nORIGINAL ADVISORY:\nhttp://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "BID", "id": "47704" }, { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "101133" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "44417", "trust": 3.1 }, { "db": "NVD", "id": "CVE-2011-2089", "trust": 2.9 }, { "db": "BID", "id": "47704", "trust": 2.7 }, { "db": "ICS CERT", "id": "ICSA-11-131-01", "trust": 2.4 }, { "db": "OSVDB", "id": "72135", "trust": 2.4 }, { "db": "EXPLOIT-DB", "id": "17269", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "17240", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2011-1174", "trust": 1.6 }, { "db": "XF", "id": "67267", "trust": 1.4 }, { "db": "CNNVD", "id": "CNNVD-201105-169", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-1744", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001794", "trust": 0.8 }, { "db": "IVD", "id": "F780BEFA-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "30D8DBBE-1F96-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "101133", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "BID", "id": "47704" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "PACKETSTORM", "id": "101133" }, { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "id": "VAR-201105-0146", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" } ], "trust": 1.7413905 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" } ] }, "last_update_date": "2023-12-18T14:02:12.822000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Hot Fixes", "trust": 0.8, "url": "http://www.iconics.com/home/support/hot-fixes.aspx" }, { "title": "ICONICS VersionInfo ActiveX Control Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/3787" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "NVD", "id": "CVE-2011-2089" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-131-01.pdf" }, { "trust": 2.4, "url": "http://secunia.com/advisories/44417" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/47704" }, { "trust": 2.0, "url": "http://www.security-assessment.com/files/documents/advisory/iconics_webhmi.pdf" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/17240" }, { "trust": 1.6, "url": "http://www.exploit-db.com/exploits/17269" }, { "trust": 1.6, "url": "http://www.osvdb.org/72135" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2011/1174" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/67267" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67267" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2089" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2089" }, { "trust": 0.8, "url": "http://osvdb.org/72135" }, { "trust": 0.6, "url": "http://secunia.com/advisories/44417/http" }, { "trust": 0.3, "url": "http://download.schneider-electric.com/files?p_file_id=320329939" }, { "trust": 0.3, "url": "http://www.iconics.com/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44417/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44417" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44417/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "BID", "id": "47704" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "PACKETSTORM", "id": "101133" }, { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" }, { "db": "BID", "id": "47704" }, { "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "db": "PACKETSTORM", "id": "101133" }, { "db": "NVD", "id": "CVE-2011-2089" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-05-16T00:00:00", "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-05-05T00:00:00", "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "date": "2011-05-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-1744" }, { "date": "2011-05-03T00:00:00", "db": "BID", "id": "47704" }, { "date": "2011-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "date": "2011-05-05T06:57:34", "db": "PACKETSTORM", "id": "101133" }, { "date": "2011-05-13T17:05:45.643000", "db": "NVD", "id": "CVE-2011-2089" }, { "date": "2011-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-05-05T00:00:00", "db": "CNVD", "id": "CNVD-2011-1744" }, { "date": "2015-04-13T21:01:00", "db": "BID", "id": "47704" }, { "date": "2011-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001794" }, { "date": "2017-08-29T01:29:16.080000", "db": "NVD", "id": "CVE-2011-2089" }, { "date": "2011-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201105-169" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201105-169" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS VersionInfo ActiveX Control Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "f780befa-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "30d8dbbe-1f96-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201105-169" } ], "trust": 1.0 } }
var-202106-1814
Vulnerability from variot
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code. Provided by Mitsubishi Electric Corporation GENESIS64 and MC Works64 of AutoCAD (DWG) The file import feature contains several vulnerabilities: It was * Out-of-bounds read (CWE-125) - CVE-2021-27040 ‥ * Out-of-bounds writing (CWE-787) - CVE-2021-27041 This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Crafted by a third party AutoCAD (DWG) Information leaks by importing the file into the product - CVE-2021-27040 Crafted by a third party AutoCAD (DWG) By importing the file into the product, any program will be executed. - CVE-2021-27041. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1814", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "autocad", "scope": null, "trust": 2.1, "vendor": "autodesk", "version": null }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "design review", "scope": "eq", "trust": 1.0, "vendor": "autodesk", "version": "2018" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "4.04e" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad architecture", "scope": "lte", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "genesis64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.04e", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-27041" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" } ], "trust": 2.1 }, "cve": "CVE-2021-27041", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-27041", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27041", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.8, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27041", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2021-003350", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2021-27041", "trust": 2.8, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-27041", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2021-003350", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-1568", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code. Provided by Mitsubishi Electric Corporation GENESIS64 and MC Works64 of AutoCAD (DWG) The file import feature contains several vulnerabilities: It was * Out-of-bounds read (CWE-125) - CVE-2021-27040 \u2025 * Out-of-bounds writing (CWE-787) - CVE-2021-27041 This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.* Crafted by a third party AutoCAD (DWG) Information leaks by importing the file into the product - CVE-2021-27040* Crafted by a third party AutoCAD (DWG) By importing the file into the product, any program will be executed. - CVE-2021-27041. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-27041" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 4.68 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-27041", "trust": 5.2 }, { "db": "ICS CERT", "id": "ICSA-21-294-01", "trust": 1.4 }, { "db": "ZDI", "id": "ZDI-21-714", "trust": 1.3 }, { "db": "ZDI", "id": "ZDI-21-1237", "trust": 1.3 }, { "db": "ZDI", "id": "ZDI-22-478", "trust": 1.3 }, { "db": "JVN", "id": "JVNVU94862669", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-003350", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12281", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12181", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-713", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14064", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15565", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021102205", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022042625", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022040706", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062421", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3527", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-1568", "trust": 0.6 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "id": "VAR-202106-1814", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.685964935 }, "last_update_date": "2022-05-14T20:19:01.789000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Autodesk has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "title": "GENESIS64 and MC\u00a0Works64 of AutoCAD(DWG) Information leakage and malicious program execution vulnerability in file import function", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2021-017.pdf" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01" }, { "title": "Autodesk has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "title": "Autodesk AutoCAD Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155361" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202106-1568" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ Other ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds read (CWE-125) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "trust": 2.1, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01" }, { "trust": 1.6, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" }, { "trust": 1.2, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-1237/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu94862669/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27041" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27040" }, { "trust": 0.7, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062421" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022040706" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3527" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-478/" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-714/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022042625" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021102205" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis64-three-vulnerabilities-36698" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-21-1237" }, { "db": "ZDI", "id": "ZDI-22-478" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "db": "NVD", "id": "CVE-2021-27041" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-714" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-713" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1237" }, { "date": "2022-03-07T00:00:00", "db": "ZDI", "id": "ZDI-22-478" }, { "date": "2021-10-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "date": "2021-06-25T13:15:00", "db": "NVD", "id": "CVE-2021-27041" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-714" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-713" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1237" }, { "date": "2022-03-07T00:00:00", "db": "ZDI", "id": "ZDI-22-478" }, { "date": "2021-11-26T02:40:00", "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1568" }, { "date": "2022-05-13T17:37:00", "db": "NVD", "id": "CVE-2021-27041" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1568" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Autodesk AutoCAD DWG File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-714" }, { "db": "ZDI", "id": "ZDI-21-713" }, { "db": "ZDI", "id": "ZDI-22-478" } ], "trust": 2.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
var-202207-1525
Vulnerability from variot
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen. ICONICS, Inc. of GENESIS 64 Exists in a past traversal vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the colorpalletes endpoint. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1525", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "genesis 64", "scope": "eq", "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis 64", "scope": "eq", "trust": 0.8, "vendor": "iconics", "version": "10.97" }, { "model": "genesis 64", "scope": "eq", "trust": 0.8, "vendor": "iconics", "version": "10.97.1" }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29834" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chris Anastasio and Steven Seeley of Incite Team", "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" } ], "trust": 0.7 }, "cve": "CVE-2022-29834", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29834", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-29834", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-29834", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29834", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2022-29834", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-2084", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" }, { "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS GENESIS64 versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 mobile monitoring application and accessing the monitoring screen. ICONICS, Inc. of GENESIS 64 Exists in a past traversal vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the colorpalletes endpoint. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise", "sources": [ { "db": "NVD", "id": "CVE-2022-29834" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "VULMON", "id": "CVE-2022-29834" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29834", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013562", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-16509", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1042", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072541", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2084", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-29834", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "VULMON", "id": "CVE-2022-29834" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" }, { "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "id": "VAR-202207-1525", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:27.917000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "ICONICS GENESIS64 Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201701" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29834" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29834/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072541" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "VULMON", "id": "CVE-2022-29834" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" }, { "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1042" }, { "db": "VULMON", "id": "CVE-2022-29834" }, { "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "db": "NVD", "id": "CVE-2022-29834" }, { "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1042" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-29834" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-29834" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1042" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-29834" }, { "date": "2023-09-08T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-013562" }, { "date": "2022-07-27T18:57:00", "db": "NVD", "id": "CVE-2022-29834" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2084" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2084" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Past traversal vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013562" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2084" } ], "trust": 0.6 } }
var-202207-1527
Vulnerability from variot
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TDFX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1527", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33315" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alex Birnberg of Zymo Security", "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" } ], "trust": 0.7 }, "cve": "CVE-2022-33315", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33315", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33315", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33315", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33315", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2022-33315", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-2079", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" }, { "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TDFX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-33315" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "VULMON", "id": "CVE-2022-33315" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33315", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013549", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-16253", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1043", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2079", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33315", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "VULMON", "id": "CVE-2022-33315" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" }, { "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "id": "VAR-202207-1527", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:27.977000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 and ICONICS GENESIS64 Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201700" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33315" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33315/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "VULMON", "id": "CVE-2022-33315" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" }, { "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1043" }, { "db": "VULMON", "id": "CVE-2022-33315" }, { "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "db": "NVD", "id": "CVE-2022-33315" }, { "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1043" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33315" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33315" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1043" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33315" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013549" }, { "date": "2022-07-27T19:03:00", "db": "NVD", "id": "CVE-2022-33315" }, { "date": "2022-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2079" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2079" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Untrusted Data Deserialization Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013549" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2079" } ], "trust": 0.6 } }
var-202201-0604
Vulnerability from variot
Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64. Mitsubishi Electric MC Works64 , ICONICS GENESIS64 , ICONICS Hyper Historian Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring and control system (SCADA) of Japan's Mitsubishi Electric (Mitsubishi Electric).
Mitsubishi Electric MC Works64 has a security vulnerability that stems from a coding error in the SQL query engine memory allocation code that makes it possible to execute a series of SQL commands in a GENESIS64 system or MC Works64 system, which can cause the SQL query engine to crash and cause SQL Server Disabled. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0604", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": "gte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.201.23" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "hyper historian", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "hyper historian", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "mc works64", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "4.00a (10.95.201.23) to 4.04e (10.95.210.01)" }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "electric mc works64 \u003c4.04e", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(10.95.210.01)" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "versionStartIncluding": "10.95.201.23", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-23130" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS and Mitsubishi Electric reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1789" } ], "trust": 0.6 }, "cve": "CVE-2022-23130", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-23130", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CNVD-2022-08357", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-23130", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-23130", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-08357", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-1789", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-23130", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64. Mitsubishi Electric MC Works64 , ICONICS GENESIS64 , ICONICS Hyper Historian Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring and control system (SCADA) of Japan\u0027s Mitsubishi Electric (Mitsubishi Electric). \n\r\n\r\nMitsubishi Electric MC Works64 has a security vulnerability that stems from a coding error in the SQL query engine memory allocation code that makes it possible to execute a series of SQL commands in a GENESIS64 system or MC Works64 system, which can cause the SQL query engine to crash and cause SQL Server Disabled. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-23130", "trust": 3.9 }, { "db": "ICS CERT", "id": "ICSA-22-020-01", "trust": 3.1 }, { "db": "JVN", "id": "JVNVU95403720", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2022-003878", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08357", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.0311", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022012108", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-1789", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-23130", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "id": "VAR-202201-0604", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" } ] }, "last_update_date": "2024-02-13T22:46:25.869000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page Mitsubishi Electric Mitsubishi\u00a0Electric\u00a0Corporation", "trust": 0.8, "url": "https://iconics.com/" }, { "title": "Patch for Mitsubishi Electric MC Works64 Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/317666" }, { "title": "Mitsubishi Electric MC Works64 Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=179833" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNNVD", "id": "CNNVD-202201-1789" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "trust": 1.7, "url": "https://jvn.jp/vu/jvnvu95403720/index.html" }, { "trust": 1.7, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-028_en.pdf" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23130" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95403720/" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01" }, { "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-020-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0311" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis64-four-vulnerabilities-37339" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022012108" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08357" }, { "db": "VULMON", "id": "CVE-2022-23130" }, { "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "db": "NVD", "id": "CVE-2022-23130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-05T00:00:00", "db": "CNVD", "id": "CNVD-2022-08357" }, { "date": "2022-01-21T00:00:00", "db": "VULMON", "id": "CVE-2022-23130" }, { "date": "2023-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "date": "2022-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "date": "2022-01-21T19:15:10.080000", "db": "NVD", "id": "CVE-2022-23130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "CNVD", "id": "CNVD-2022-08357" }, { "date": "2022-01-27T00:00:00", "db": "VULMON", "id": "CVE-2022-23130" }, { "date": "2023-03-10T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-003878" }, { "date": "2022-02-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1789" }, { "date": "2022-01-27T20:42:26.387000", "db": "NVD", "id": "CVE-2022-23130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1789" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric products and multiple \u00a0ICONICS\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003878" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1789" } ], "trust": 0.6 } }
var-202207-1529
Vulnerability from variot
Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes. ICONICS, Inc. of GENESIS 64 Products from several other vendors contain vulnerabilities related to the incorporation of functionality from untrusted control areas.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TDFX files. The issue results from the exposure of a dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1529", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": null, "trust": 1.4, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33317" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Noam Moshe of Claroty Research", "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" } ], "trust": 0.7 }, "cve": "CVE-2022-33317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33317", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33317", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "id": "CVE-2022-33317", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33317", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33317", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2022-33317", "trust": 0.7, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2022-33317", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-2074", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" }, { "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Inclusion of Functionality from Untrusted Control Sphere vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes. ICONICS, Inc. of GENESIS 64 Products from several other vendors contain vulnerabilities related to the incorporation of functionality from untrusted control areas.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of TDFX files. The issue results from the exposure of a dangerous method. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-33317" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "VULMON", "id": "CVE-2022-33317" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33317", "trust": 4.7 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013547", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17360", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1162", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17198", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1039", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2074", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33317", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "VULMON", "id": "CVE-2022-33317" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" }, { "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "id": "VAR-202207-1529", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:27.883000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 and ICONICS GENESIS64 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201699" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-829", "trust": 1.0 }, { "problemtype": "Incorporating features from untrusted control areas (CWE-829) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 1.5, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33317" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33317/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "VULMON", "id": "CVE-2022-33317" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" }, { "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1162" }, { "db": "ZDI", "id": "ZDI-22-1039" }, { "db": "VULMON", "id": "CVE-2022-33317" }, { "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "db": "NVD", "id": "CVE-2022-33317" }, { "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1162" }, { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1039" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33317" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33317" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1162" }, { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1039" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33317" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013547" }, { "date": "2022-07-27T19:02:00", "db": "NVD", "id": "CVE-2022-33317" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Vulnerabilities related to embedding functionality from untrusted control areas in products from multiple other vendors", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013547" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2074" } ], "trust": 0.6 } }
var-202007-1579
Vulnerability from variot
The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PKGX files. The application fails to validate the cryptographic signature of the package. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1579", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ZDIcases", "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ], "trust": 0.7 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "ZDI-20-800", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "ZDI-20-800", "trust": 0.7, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PKGX files. The application fails to validate the cryptographic signature of the package. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.", "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ], "trust": 0.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI_CAN", "id": "ZDI-CAN-10273", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-800", "trust": 0.7 } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "id": "VAR-202007-1579", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.45526317 }, "last_update_date": "2022-05-17T01:40:53.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-04" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-20-800" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-01T00:00:00", "db": "ZDI", "id": "ZDI-20-800" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-01T00:00:00", "db": "ZDI", "id": "ZDI-20-800" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "(Pwn2Own) ICONICS Genesis64 PKGX Improper Verification of Cryptographic Signature Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-800" } ], "trust": 0.7 } }
var-202201-0606
Vulnerability from variot
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information. Mitsubishi Electric MC Works64 and ICONICS GENESIS64 There is a vulnerability in plaintext storage of important information.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0606", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": "lt", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.90" }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "mc works64", "scope": "lte", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "4.04e (10.95.210.01) and earlier" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "versionStartIncluding": "10.90", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-23129" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS and Mitsubishi Electric reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1795" } ], "trust": 0.6 }, "cve": "CVE-2022-23129", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2022-23129", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-23129", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-23129", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-23129", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-1795", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information. Mitsubishi Electric MC Works64 and ICONICS GENESIS64 There is a vulnerability in plaintext storage of important information.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-23129" }, { "db": "JVNDB", "id": "JVNDB-2022-003879" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-23129", "trust": 3.2 }, { "db": "JVN", "id": "JVNVU95403720", "trust": 2.4 }, { "db": "ICS CERT", "id": "ICSA-22-020-01", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2022-003879", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0311", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022012109", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202201-1795", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "id": "VAR-202201-0606", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-03-11T22:22:54.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page Mitsubishi Electric Mitsubishi\u00a0Electric\u00a0Corporation", "trust": 0.8, "url": "https://iconics.com/" }, { "title": "Mitsubishi Electric MC Works64 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=179834" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "CNNVD", "id": "CNNVD-202201-1795" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-312", "trust": 1.0 }, { "problemtype": "Plaintext storage of important information (CWE-312) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-020-01" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-027_en.pdf" }, { "trust": 1.6, "url": "https://jvn.jp/vu/jvnvu95403720/index.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23129" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95403720/" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0311" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis64-four-vulnerabilities-37339" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022012109" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "db": "NVD", "id": "CVE-2022-23129" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "date": "2022-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "date": "2022-01-21T19:15:00", "db": "NVD", "id": "CVE-2022-23129" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-10T03:13:00", "db": "JVNDB", "id": "JVNDB-2022-003879" }, { "date": "2022-02-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-1795" }, { "date": "2022-01-27T20:09:00", "db": "NVD", "id": "CVE-2022-23129" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1795" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi\u00a0Electric\u00a0MC\u00a0Works64\u00a0 and \u00a0ICONICS\u00a0GENESIS64\u00a0 Vulnerability in plaintext storage of important information in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003879" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-1795" } ], "trust": 0.6 } }
var-202207-1526
Vulnerability from variot
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the GenBroker64 service. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the Administrator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1526", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33318" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Axel \u00270vercl0k\u0027 Souchet", "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" } ], "trust": 0.7 }, "cve": "CVE-2022-33318", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-33318", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33318", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-33318", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33318", "trust": 1.8, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2022-33318", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202207-2071", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" }, { "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64 server. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the GenBroker64 service. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the Administrator", "sources": [ { "db": "NVD", "id": "CVE-2022-33318" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "VULMON", "id": "CVE-2022-33318" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33318", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013546", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17200", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1041", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2071", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33318", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "VULMON", "id": "CVE-2022-33318" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" }, { "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "id": "VAR-202207-1526", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:27.948000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201119" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33318" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33318/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "VULMON", "id": "CVE-2022-33318" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" }, { "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1041" }, { "db": "VULMON", "id": "CVE-2022-33318" }, { "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "db": "NVD", "id": "CVE-2022-33318" }, { "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1041" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33318" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33318" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1041" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33318" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013546" }, { "date": "2022-07-27T18:59:00", "db": "NVD", "id": "CVE-2022-33318" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2071" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2071" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Untrusted Data Deserialization Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013546" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2071" } ], "trust": 0.6 } }
var-201103-0378
Vulnerability from variot
The Symantec LiveUpdate Administrator is a Symantec product upgrade management program. GENESIS32/64 is a new generation of industrial control software developed by ICONICS of the United States. GENESIS32/64 can trigger multiple memory corruption and integer overflow vulnerabilities due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. Failed exploit attempts will likely result in denial-of-service conditions. The following versions are vulnerable; other versions may also be affected: GENESIS32 9.21 GENESIS64 10.51
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0378", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis32", "scope": "eq", "trust": 1.1, "vendor": "iconics", "version": "9.21" }, { "model": "genesis64", "scope": "eq", "trust": 0.9, "vendor": "iconics", "version": "10.51" }, { "model": "genesis32", "scope": "eq", "trust": 0.3, "vendor": "iconics", "version": "9.21.201.01" }, { "model": "genesis64", "scope": "eq", "trust": 0.2, "vendor": "iconics", "version": "10.51*" } ], "sources": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1178" }, { "db": "BID", "id": "46939" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "46939" }, { "db": "CNNVD", "id": "CNNVD-201503-530" } ], "trust": 0.9 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d", "impactScore": 7.8, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:C", "version": "2.0 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Symantec LiveUpdate Administrator is a Symantec product upgrade management program. GENESIS32/64 is a new generation of industrial control software developed by ICONICS of the United States. GENESIS32/64 can trigger multiple memory corruption and integer overflow vulnerabilities due to incorrect validation of user-supplied input. Successful exploitation of a vulnerability can execute arbitrary code in an application security context. Failed exploit attempts will likely result in denial-of-service conditions. \nThe following versions are vulnerable; other versions may also be affected:\nGENESIS32 9.21\nGENESIS64 10.51", "sources": [ { "db": "CNVD", "id": "CNVD-2011-1178" }, { "db": "BID", "id": "46939" }, { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" } ], "trust": 0.99 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "46939", "trust": 1.5 }, { "db": "CNVD", "id": "CNVD-2011-1178", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201503-530", "trust": 0.6 }, { "db": "IVD", "id": "2335B7AC-1F9B-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1178" }, { "db": "BID", "id": "46939" }, { "db": "CNNVD", "id": "CNNVD-201503-530" } ] }, "id": "VAR-201103-0378", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1178" } ], "trust": 1.343421035 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1178" } ] }, "last_update_date": "2022-05-17T01:46:45.580000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.6, "url": "http://www.securityfocus.com/bid/46939http" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/46939" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_1-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_10-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_11-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_12-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_13-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_2-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_3-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_4-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_5-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_6-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_7-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_8-adv.txt" }, { "trust": 0.3, "url": "http://aluigi.org/adv/genesis_9-adv.txt" }, { "trust": 0.3, "url": "http://www.iconics.com/home/products/hmi-and-scada/genesis32.aspx" }, { "trust": 0.3, "url": "http://www.iconics.com/home/products/hmi-and-scada/genesis64.aspx" }, { "trust": 0.3, "url": "/archive/1/517080" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1178" }, { "db": "BID", "id": "46939" }, { "db": "CNNVD", "id": "CNNVD-201503-530" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-1178" }, { "db": "BID", "id": "46939" }, { "db": "CNNVD", "id": "CNNVD-201503-530" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "IVD", "id": "2335b7ac-1f9b-11e6-abef-000c29c66e3d" }, { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1178" }, { "date": "2011-03-21T00:00:00", "db": "BID", "id": "46939" }, { "date": "2011-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-530" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-22T00:00:00", "db": "CNVD", "id": "CNVD-2011-1178" }, { "date": "2015-03-19T09:13:00", "db": "BID", "id": "46939" }, { "date": "2015-03-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-530" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-530" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There are multiple security vulnerabilities in Iconics GENESIS32 and GENESIS64", "sources": [ { "db": "CNVD", "id": "CNVD-2011-1178" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-530" } ], "trust": 0.6 } }
var-202007-0206
Vulnerability from variot
A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PKGX files. When parsing the WbPackAndGoSettings element, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0206", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "model": "mc works", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(9.50.255.02)" }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.4, "vendor": "mitsubishi", "version": "(9.50.255.02)*" } ], "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "NVD", "id": "CVE-2020-12009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.208.31", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works32:9.50.255.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:facility_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:quality_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:smart_energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12009" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Team FLASHBACK: Pedro Ribeiro (pedrib@gmail.com|@pedrib1337) and Radek Domanski (@RabbitPro)", "sources": [ { "db": "ZDI", "id": "ZDI-20-777" } ], "trust": 0.7 }, "cve": "CVE-2020-12009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34371", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-12009", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-12009", "trust": 1.0, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2020-12009", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2020-34371", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1208", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "NVD", "id": "CVE-2020-12009" }, { "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PKGX files. When parsing the WbPackAndGoSettings element, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12009" }, { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12009", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-20-777", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34371", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1208", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10272", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "D97CB3A1-CB5E-4BB3-B9B8-62A73DD1F132", "trust": 0.2 }, { "db": "IVD", "id": "2AEA7BB9-A918-4CCF-A751-B9794DF3809B", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "NVD", "id": "CVE-2020-12009" }, { "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "id": "VAR-202007-0206", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "CNVD", "id": "CNVD-2020-34371" } ], "trust": 1.78927874 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "CNVD", "id": "CNVD-2020-34371" } ] }, "last_update_date": "2023-12-18T12:35:28.353000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 and MC Works32 Code Issue Vulnerability (CNVD-2020-34371)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/222935" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-777/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12009" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "NVD", "id": "CVE-2020-12009" }, { "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "ZDI", "id": "ZDI-20-777" }, { "db": "CNVD", "id": "CNVD-2020-34371" }, { "db": "NVD", "id": "CVE-2020-12009" }, { "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-777" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34371" }, { "date": "2020-07-16T20:15:11.057000", "db": "NVD", "id": "CVE-2020-12009" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-777" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34371" }, { "date": "2020-07-29T13:53:26.653000", "db": "NVD", "id": "CVE-2020-12009" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1208" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1208" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "(Pwn2Own) ICONICS Genesis64 PKGX WbPackAndGoSettings Absolute Path Traversal Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-777" } ], "trust": 0.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "d97cb3a1-cb5e-4bb3-b9b8-62a73dd1f132" }, { "db": "IVD", "id": "2aea7bb9-a918-4ccf-a751-b9794df3809b" }, { "db": "CNNVD", "id": "CNNVD-202006-1208" } ], "trust": 1.0 } }
var-202207-1528
Vulnerability from variot
Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server. ICONICS, Inc. of GENESIS 64 Products from other vendors have out-of-bounds read vulnerabilities.Information is obtained and service operation is interrupted (DoS) It may be in a state. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64 GenBroker64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the GenBroker64 service, which listens on TCP port 38080 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to disclose information in the context of the current process or to create a denial-of-service condition on the system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1528", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33319" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Axel \u00270vercl0k\u0027 Souchet from https://doar-e.github.io/", "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" } ], "trust": 0.7 }, "cve": "CVE-2022-33319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2022-33319", "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33319", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 2.2, "id": "CVE-2022-33319", "impactScore": 4.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33319", "trust": 1.8, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2022-33319", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-2070", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" }, { "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds Read vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64 server. ICONICS, Inc. of GENESIS 64 Products from other vendors have out-of-bounds read vulnerabilities.Information is obtained and service operation is interrupted (DoS) It may be in a state. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64 GenBroker64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the GenBroker64 service, which listens on TCP port 38080 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to disclose information in the context of the current process or to create a denial-of-service condition on the system", "sources": [ { "db": "NVD", "id": "CVE-2022-33319" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "VULMON", "id": "CVE-2022-33319" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33319", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013545", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17389", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1044", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2070", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33319", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "VULMON", "id": "CVE-2022-33319" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" }, { "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "id": "VAR-202207-1528", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:28.007000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201118" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33319" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33319/" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "VULMON", "id": "CVE-2022-33319" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" }, { "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1044" }, { "db": "VULMON", "id": "CVE-2022-33319" }, { "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "db": "NVD", "id": "CVE-2022-33319" }, { "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1044" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33319" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33319" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1044" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33319" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013545" }, { "date": "2022-07-27T18:56:00", "db": "NVD", "id": "CVE-2022-33319" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2070" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2070" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Out-of-Bounds Read Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013545" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2070" } ], "trust": 0.6 } }
var-202007-0207
Vulnerability from variot
A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition or allow remote code execution. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; GenBroker32 version 9.5 and prior. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of indexes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "model": "mc works", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(9.50.255.02)" }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.4, "vendor": "mitsubishi", "version": "(9.50.255.02)*" } ], "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "NVD", "id": "CVE-2020-12011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.208.31", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works32:9.50.255.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:facility_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:quality_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:smart_energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12011" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tobias Scharnowski, Niklas Breitfeld, and Ali Abbasi", "sources": [ { "db": "ZDI", "id": "ZDI-20-778" } ], "trust": 0.7 }, "cve": "CVE-2020-12011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2020-34373", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "2e91579b-642f-4242-83f1-d1d890cc5345", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "213f4b05-e0a3-4f65-b456-b752579d9402", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12011", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-12011", "trust": 1.0, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2020-12011", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-34373", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1210", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "NVD", "id": "CVE-2020-12011" }, { "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition or allow remote code execution. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; GenBroker32 version 9.5 and prior. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of indexes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12011" }, { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12011", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-20-778", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34373", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1210", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10274", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "2E91579B-642F-4242-83F1-D1D890CC5345", "trust": 0.2 }, { "db": "IVD", "id": "213F4B05-E0A3-4F65-B456-B752579D9402", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "NVD", "id": "CVE-2020-12011" }, { "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "id": "VAR-202007-0207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "CNVD", "id": "CNVD-2020-34373" } ], "trust": 1.78927874 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "CNVD", "id": "CNVD-2020-34373" } ] }, "last_update_date": "2023-12-18T12:35:28.320000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 and MC Works32 buffer overflow vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/222929" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-778/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12011" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "NVD", "id": "CVE-2020-12011" }, { "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "ZDI", "id": "ZDI-20-778" }, { "db": "CNVD", "id": "CNVD-2020-34373" }, { "db": "NVD", "id": "CVE-2020-12011" }, { "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-778" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34373" }, { "date": "2020-07-16T19:15:11.830000", "db": "NVD", "id": "CVE-2020-12011" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-778" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34373" }, { "date": "2020-07-29T13:55:13.330000", "db": "NVD", "id": "CVE-2020-12011" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1210" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1210" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "(Pwn2Own) ICONICS Genesis64 VariantClear Out-Of-Bounds Access Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-778" } ], "trust": 0.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer error", "sources": [ { "db": "IVD", "id": "2e91579b-642f-4242-83f1-d1d890cc5345" }, { "db": "IVD", "id": "213f4b05-e0a3-4f65-b456-b752579d9402" }, { "db": "CNNVD", "id": "CNNVD-202006-1210" } ], "trust": 1.0 } }
var-202007-0208
Vulnerability from variot
A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Several Mitsubishi Electric products contain vulnerabilities related to unreliable data deserialization.Service operation interruption (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0208", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "model": "mc works", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "bizviz", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "energy analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "quality analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "mc works", "scope": "eq", "trust": 0.8, "vendor": "mitsubishi electric", "version": "64" }, { "model": "mc works 32", "scope": null, "trust": 0.8, "vendor": "mitsubishi electric", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(9.50.255.02)" }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.4, "vendor": "mitsubishi", "version": "(9.50.255.02)*" } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.208.31", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works32:9.50.255.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:facility_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:quality_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:smart_energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12015" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Chris Anastasio (muffin) and Steven Seeley (mr_me) of Incite Team", "sources": [ { "db": "ZDI", "id": "ZDI-20-780" } ], "trust": 0.7 }, "cve": "CVE-2020-12015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-008308", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34372", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "31ad87c7-757e-410a-89c6-906cc763b446", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-008308", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12015", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-12015", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-008308", "trust": 0.8, "value": "High" }, { "author": "ZDI", "id": "CVE-2020-12015", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-34372", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1209", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Several Mitsubishi Electric products contain vulnerabilities related to unreliable data deserialization.Service operation interruption (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Mitsubishi Electric MC Works64 and MC Works32 are a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" } ], "trust": 3.15 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12015", "trust": 4.1 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 2.4 }, { "db": "ZDI", "id": "ZDI-20-780", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34372", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1209", "trust": 1.0 }, { "db": "JVN", "id": "JVNVU95379131", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008308", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10297", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "4BDA61CA-BD50-4B09-A018-05EA35FF2332", "trust": 0.2 }, { "db": "IVD", "id": "31AD87C7-757E-410A-89C6-906CC763B446", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "id": "VAR-202007-0208", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNVD", "id": "CNVD-2020-34372" } ], "trust": 1.78927874 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNVD", "id": "CNVD-2020-34372" } ] }, "last_update_date": "2023-12-18T12:35:28.279000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://iconics.com/" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 and MC Works32 code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/222933" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 2.3, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12015" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12015" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95379131/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-780/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "ZDI", "id": "ZDI-20-780" }, { "db": "CNVD", "id": "CNVD-2020-34372" }, { "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "db": "NVD", "id": "CVE-2020-12015" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-780" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34372" }, { "date": "2020-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "date": "2020-07-16T22:15:11.493000", "db": "NVD", "id": "CVE-2020-12015" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-780" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34372" }, { "date": "2020-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008308" }, { "date": "2020-07-22T17:39:48.070000", "db": "NVD", "id": "CVE-2020-12015" }, { "date": "2020-07-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1209" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1209" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unreliable data deserialization vulnerabilities in multiple MC products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008308" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "4bda61ca-bd50-4b09-a018-05ea35ff2332" }, { "db": "IVD", "id": "31ad87c7-757e-410a-89c6-906cc763b446" }, { "db": "CNNVD", "id": "CNNVD-202006-1209" } ], "trust": 1.0 } }
var-202007-1433
Vulnerability from variot
A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of requests to the TestQuery endpoint of the IcoFwxServer service. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the current process.
There is a code injection vulnerability in Mitsubishi Electric MC Works64 4.02C (10.95.208.31) and previous versions and MC Works32 3.00A (9.50.255.02) version, remote attackers can use the specially crafted message to exploit this vulnerability to execute arbitrary SQL commands and leak, tamper with internal data. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-1433", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.6, "vendor": "mitsubishi", "version": "(9.50.255.02)" }, { "model": "electric mc works32 3.00a", "scope": "eq", "trust": 0.4, "vendor": "mitsubishi", "version": "(9.50.255.02)*" } ], "sources": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "NVD", "id": "CVE-2020-12013" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works32:9.50.255.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.208.31", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:facility_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:quality_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:smart_energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12013" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ben McBride", "sources": [ { "db": "ZDI", "id": "ZDI-20-779" } ], "trust": 0.7 }, "cve": "CVE-2020-12013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 9.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34370", "impactScore": 9.5, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 9.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "619034f0-2a16-43eb-8d34-f889bd91a2af", "impactScore": 9.5, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 9.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "e2b262e1-e8a9-471a-a771-486f23cd118b", "impactScore": 9.5, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2020-12013", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-12013", "trust": 1.0, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2020-12013", "trust": 0.7, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2020-34370", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1207", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "NVD", "id": "CVE-2020-12013" }, { "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS Genesis64. Authentication is not required to exploit this vulnerability.The specific flaw exists within the processing of requests to the TestQuery endpoint of the IcoFwxServer service. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the current process. \n\r\n\r\nThere is a code injection vulnerability in Mitsubishi Electric MC Works64 4.02C (10.95.208.31) and previous versions and MC Works32 3.00A (9.50.255.02) version, remote attackers can use the specially crafted message to exploit this vulnerability to execute arbitrary SQL commands and leak, tamper with internal data. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12013" }, { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12013", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 2.2 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 1.6 }, { "db": "ZDI", "id": "ZDI-20-779", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34370", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1207", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10288", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "619034F0-2A16-43EB-8D34-F889BD91A2AF", "trust": 0.2 }, { "db": "IVD", "id": "E2B262E1-E8A9-471A-A771-486F23CD118B", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "NVD", "id": "CVE-2020-12013" }, { "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "id": "VAR-202007-1433", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "CNVD", "id": "CNVD-2020-34370" } ], "trust": 1.78927874 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "CNVD", "id": "CNVD-2020-34370" } ] }, "last_update_date": "2023-12-18T12:35:28.209000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 and MC Works32 code injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/222939" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-89", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 1.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-779/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12013" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "NVD", "id": "CVE-2020-12013" }, { "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "db": "ZDI", "id": "ZDI-20-779" }, { "db": "CNVD", "id": "CNVD-2020-34370" }, { "db": "NVD", "id": "CVE-2020-12013" }, { "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "619034f0-2a16-43eb-8d34-f889bd91a2af" }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "e2b262e1-e8a9-471a-a771-486f23cd118b" }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-779" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34370" }, { "date": "2020-07-16T22:15:11.417000", "db": "NVD", "id": "CVE-2020-12013" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-779" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34370" }, { "date": "2021-11-04T17:39:53.020000", "db": "NVD", "id": "CVE-2020-12013" }, { "date": "2021-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1207" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS Genesis64 TestQuery SQL Injection Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-20-779" } ], "trust": 0.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SQL injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1207" } ], "trust": 0.6 } }
var-202212-1382
Vulnerability from variot
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker. Provided by Mitsubishi Electric Corporation GENESIS64 's project management function has a path traversal vulnerability ( CWE-22 , CVE-2022-40264 ) Exists. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. GENESIS64 may create, alter, or destroy arbitrary files. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PKGX files. When parsing the Name element, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202212-1382", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97.2" }, { "model": "genesis64", "scope": "gte", "trust": 1.0, "vendor": "iconics", "version": "10.96" }, { "model": "genesis64", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": "version 10.97 to version 10.97.2 to" }, { "model": "genesis64", "scope": "eq", "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97.2", "versionStartIncluding": "10.96", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-40264" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Noam Moshe of Claroty Research", "sources": [ { "db": "ZDI", "id": "ZDI-23-342" } ], "trust": 0.7 }, "cve": "CVE-2022-40264", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "id": "CVE-2022-40264", "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "None", "baseScore": 6.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2022-002777", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-40264", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-40264", "trust": 1.0, "value": "HIGH" }, { "author": "OTHER", "id": "JVNDB-2022-002777", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2022-40264", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202212-3229", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in ICONICS/Mitsubishi Electric GENESIS64 versions 10.96 to 10.97.2 allows an unauthenticated attacker to create, tamper with or destroy arbitrary files by getting a legitimate user import a project package file crafted by the attacker. Provided by Mitsubishi Electric Corporation GENESIS64 \u0027s project management function has a path traversal vulnerability ( CWE-22 , CVE-2022-40264 ) Exists. This vulnerability information is provided by the developer for the purpose of disseminating it to product users. GENESIS64 may create, alter, or destroy arbitrary files. The vulnerablity allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PKGX files. When parsing the Name element, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-40264" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "ZDI", "id": "ZDI-23-342" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-40264", "trust": 3.1 }, { "db": "ICS CERT", "id": "ICSA-22-347-01", "trust": 2.4 }, { "db": "JVN", "id": "JVNVU95858406", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002777", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17368", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-342", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202212-3229", "trust": 0.6 } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "id": "VAR-202212-1382", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-04-02T22:57:48.889000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "GENESIS64(TM)\u00a0 Information Falsification Vulnerability in Project Management Function of", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2022-014.pdf" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-01" }, { "title": "Mitsubishi Electric GENESIS64 Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=218186" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "CNNVD", "id": "CNNVD-202212-3229" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.0 }, { "problemtype": "Path traversal (CWE-22) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://jvn.jp/vu/jvnvu95858406/index.html" }, { "trust": 2.4, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-01" }, { "trust": 1.6, "url": "https://iconics.com/about/security/cert" }, { "trust": 1.6, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-014_en.pdf" }, { "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-01" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-40264/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-23-342" }, { "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "db": "NVD", "id": "CVE-2022-40264" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-31T00:00:00", "db": "ZDI", "id": "ZDI-23-342" }, { "date": "2022-12-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "date": "2022-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "date": "2022-12-14T00:15:00", "db": "NVD", "id": "CVE-2022-40264" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-03-31T00:00:00", "db": "ZDI", "id": "ZDI-23-342" }, { "date": "2022-12-15T01:13:00", "db": "JVNDB", "id": "JVNDB-2022-002777" }, { "date": "2022-12-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202212-3229" }, { "date": "2022-12-16T17:09:00", "db": "NVD", "id": "CVE-2022-40264" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3229" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Made by Mitsubishi Electric \u00a0GENESIS64\u00a0 Path Traversal Vulnerability in Project Management Function of", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002777" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202212-3229" } ], "trust": 0.6 } }
var-202007-0205
Vulnerability from variot
A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0205", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "electric mc works64 \u003c=4.02c", "scope": "eq", "trust": 1.0, "vendor": "mitsubishi", "version": "(10.95.208.31)" }, { "model": "bizviz", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mc works32", "scope": "eq", "trust": 1.0, "vendor": "mitsubishielectric", "version": "9.50.255.02" }, { "model": "mc works", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.208.31" }, { "model": "quality analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "hyper historian", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "mobilehmi", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "smart energy analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis32", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "facility analytix", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "NVD", "id": "CVE-2020-12007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works32:9.50.255.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.208.31", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:mobilehmi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:facility_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:quality_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:smart_energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:energy_analytix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:hyper_historian:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis32:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:bizviz:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12007" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yehuda Anikster of Claroty Research", "sources": [ { "db": "ZDI", "id": "ZDI-20-776" } ], "trust": 0.7 }, "cve": "CVE-2020-12007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2020-34369", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-12007", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ZDI", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-12007", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "NONE", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-12007", "trust": 1.0, "value": "CRITICAL" }, { "author": "ZDI", "id": "CVE-2020-12007", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2020-34369", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202006-1227", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a", "trust": 0.2, "value": "HIGH" }, { "author": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b", "trust": 0.2, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-12007", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "VULMON", "id": "CVE-2020-12007" }, { "db": "NVD", "id": "CVE-2020-12007" }, { "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior. Authentication is not required to exploit this vulnerability.The specific flaw exists with the handling of serialized objects. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Mitsubishi Electric MC Works64 is a set of data acquisition and monitoring system (SCADA) of Japan Mitsubishi Electric (Mitsubishi Electric) company. ** ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12007" }, { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "VULMON", "id": "CVE-2020-12007" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12007", "trust": 3.4 }, { "db": "ICS CERT", "id": "ICSA-20-170-02", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-20-170-03", "trust": 1.7 }, { "db": "ZDI", "id": "ZDI-20-776", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2020-34369", "trust": 1.0 }, { "db": "CNNVD", "id": "CNNVD-202006-1227", "trust": 1.0 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-10267", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.2147", "trust": 0.6 }, { "db": "IVD", "id": "B28667EE-4B0F-4654-BD4F-FBB2C24C795A", "trust": 0.2 }, { "db": "IVD", "id": "36556B9E-B308-4C4F-A8AF-5FCE9F89C31B", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2020-12007", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "VULMON", "id": "CVE-2020-12007" }, { "db": "NVD", "id": "CVE-2020-12007" }, { "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "id": "VAR-202007-0205", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "CNVD", "id": "CNVD-2020-34369" } ], "trust": 1.736598425 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.0 } ], "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "CNVD", "id": "CNVD-2020-34369" } ] }, "last_update_date": "2023-12-18T12:35:28.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "title": "Patch for Mitsubishi Electric MC Works64 code issue vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/222941" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-12007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-03" }, { "trust": 1.2, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-02" }, { "trust": 1.0, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02%2c" }, { "trust": 0.7, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-170-03" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12007" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-20-776/" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis32-genesis64-multiple-vulnerabilities-32668" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2147/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/502.html" }, { "trust": 0.1, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-170-02," }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/183626" } ], "sources": [ { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "VULMON", "id": "CVE-2020-12007" }, { "db": "NVD", "id": "CVE-2020-12007" }, { "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "ZDI", "id": "ZDI-20-776" }, { "db": "CNVD", "id": "CNVD-2020-34369" }, { "db": "VULMON", "id": "CVE-2020-12007" }, { "db": "NVD", "id": "CVE-2020-12007" }, { "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "date": "2020-06-18T00:00:00", "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-776" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34369" }, { "date": "2020-07-16T00:00:00", "db": "VULMON", "id": "CVE-2020-12007" }, { "date": "2020-07-16T22:15:11.337000", "db": "NVD", "id": "CVE-2020-12007" }, { "date": "2020-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-30T00:00:00", "db": "ZDI", "id": "ZDI-20-776" }, { "date": "2020-06-23T00:00:00", "db": "CNVD", "id": "CNVD-2020-34369" }, { "date": "2020-07-29T00:00:00", "db": "VULMON", "id": "CVE-2020-12007" }, { "date": "2023-11-07T03:15:18.663000", "db": "NVD", "id": "CVE-2020-12007" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-1227" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-1227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mitsubishi Electric MC Works64 Code Issue Vulnerability", "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "CNVD", "id": "CNVD-2020-34369" } ], "trust": 1.0 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "b28667ee-4b0f-4654-bd4f-fbb2c24c795a" }, { "db": "IVD", "id": "36556b9e-b308-4c4f-a8af-5fce9f89c31b" }, { "db": "CNNVD", "id": "CNNVD-202006-1227" } ], "trust": 1.0 } }
var-202207-1524
Vulnerability from variot
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of GDFX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1524", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": null, "trust": 0.7, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33316" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Steven Seeley (mr_me) and Chris Anastasio (muffin) of Incite Team", "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" } ], "trust": 0.7 }, "cve": "CVE-2022-33316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33316", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33316", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 0.7, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33316", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2022-33316", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-2077", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" }, { "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of GDFX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-33316" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "VULMON", "id": "CVE-2022-33316" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33316", "trust": 4.0 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2022-013548", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17215", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1040", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2077", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33316", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "VULMON", "id": "CVE-2022-33316" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" }, { "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "id": "VAR-202207-1524", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:28.036000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 and ICONICS GENESIS64 Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201403" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33316" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33316/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "VULMON", "id": "CVE-2022-33316" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" }, { "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1040" }, { "db": "VULMON", "id": "CVE-2022-33316" }, { "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "db": "NVD", "id": "CVE-2022-33316" }, { "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1040" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33316" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33316" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-03T00:00:00", "db": "ZDI", "id": "ZDI-22-1040" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33316" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013548" }, { "date": "2022-07-27T19:03:00", "db": "NVD", "id": "CVE-2022-33316" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2077" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2077" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS,\u00a0Inc.\u00a0 of \u00a0GENESIS\u00a064\u00a0 Untrusted Data Deserialization Vulnerability in Other Vendors\u0027 Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2077" } ], "trust": 0.6 } }
var-202207-1523
Vulnerability from variot
Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PKGX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1523", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "genesis64", "scope": null, "trust": 1.4, "vendor": "iconics", "version": null }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97.1" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "10.95.210.01" }, { "model": "genesis64", "scope": "eq", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "genesis 64", "scope": null, "trust": 0.8, "vendor": "iconics", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:10.97:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.95.210.01", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-33320" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Noam Moshe of Claroty Research", "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" } ], "trust": 1.4 }, "cve": "CVE-2022-33320", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33320", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.4, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-33320", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-33320", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-33320", "trust": 1.8, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2022-33320", "trust": 1.4, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-2068", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" }, { "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Deserialization of Untrusted Data vulnerability in ICONICS GENESIS64 versions 10.97.1 and prior and Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes. ICONICS, Inc. of GENESIS 64 Products from multiple other vendors contain untrusted data deserialization vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PKGX files. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process", "sources": [ { "db": "NVD", "id": "CVE-2022-33320" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "VULMON", "id": "CVE-2022-33320" } ], "trust": 2.97 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-33320", "trust": 4.7 }, { "db": "JVN", "id": "JVNVU96480474", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-22-202-04", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2022-013544", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17361", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-22-1163", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-17369", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-23-343", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022072542", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202207-2068", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-33320", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "VULMON", "id": "CVE-2022-33320" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" }, { "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "id": "VAR-202207-1523", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.42615384 }, "last_update_date": "2023-09-10T22:31:28.066000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "title": "Mitsubishi Electric MC Works64 Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=201698" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-502", "trust": 1.0 }, { "problemtype": "Deserialization of untrusted data (CWE-502) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://jvn.jp/vu/jvnvu96480474/index.html" }, { "trust": 2.5, "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2022-008_en.pdf" }, { "trust": 1.5, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-04" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96480474/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-33320" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-33320/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022072542" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-202-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "VULMON", "id": "CVE-2022-33320" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" }, { "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" }, { "db": "VULMON", "id": "CVE-2022-33320" }, { "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "db": "NVD", "id": "CVE-2022-33320" }, { "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1163" }, { "date": "2023-03-31T00:00:00", "db": "ZDI", "id": "ZDI-23-343" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33320" }, { "date": "2023-09-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "date": "2022-07-20T17:15:00", "db": "NVD", "id": "CVE-2022-33320" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-23T00:00:00", "db": "ZDI", "id": "ZDI-22-1163" }, { "date": "2023-03-31T00:00:00", "db": "ZDI", "id": "ZDI-23-343" }, { "date": "2022-07-20T00:00:00", "db": "VULMON", "id": "CVE-2022-33320" }, { "date": "2023-09-08T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-013544" }, { "date": "2022-07-27T18:55:00", "db": "NVD", "id": "CVE-2022-33320" }, { "date": "2022-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-2068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2068" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICONICS GENESIS64 PKGX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-22-1163" }, { "db": "ZDI", "id": "ZDI-23-343" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-2068" } ], "trust": 0.6 } }
var-202106-1815
Vulnerability from variot
A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code. Provided by Mitsubishi Electric Corporation GENESIS64 and MC Works64 of AutoCAD (DWG) The file import feature contains several vulnerabilities: It was * Out-of-bounds read (CWE-125) - CVE-2021-27040 ‥ * Out-of-bounds writing (CWE-787) - CVE-2021-27041 This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers. Crafted by a third party AutoCAD (DWG) Information leaks by importing the file into the product - CVE-2021-27040 Crafted by a third party AutoCAD (DWG) By importing the file into the product, any program will be executed. - CVE-2021-27041. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1815", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "autocad", "scope": null, "trust": 5.6, "vendor": "autodesk", "version": null }, { "model": "genesis64", "scope": null, "trust": 2.1, "vendor": "iconics", "version": null }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad electrical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "dwg trueview", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.1.1" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad map 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "mc works64", "scope": "lte", "trust": 1.0, "vendor": "mitsubishielectric", "version": "4.04e" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "dwg trueview", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad mep", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "advance steel", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad plant 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad architecture", "scope": "lte", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad plant 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad electrical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "autocad mep", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "autocad architecture", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2022.0.1" }, { "model": "autocad lt", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2020.1.4" }, { "model": "autocad mechanical", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2019.1.3" }, { "model": "autocad architecture", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "autocad lt", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2021" }, { "model": "genesis64", "scope": "lte", "trust": 1.0, "vendor": "iconics", "version": "10.97" }, { "model": "autocad map 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "advance steel", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2020" }, { "model": "civil 3d", "scope": "lt", "trust": 1.0, "vendor": "autodesk", "version": "2021.1.1" }, { "model": "civil 3d", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2022" }, { "model": "autocad mechanical", "scope": "gte", "trust": 1.0, "vendor": "autodesk", "version": "2019" }, { "model": "genesis64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null }, { "model": "mc works64", "scope": null, "trust": 0.8, "vendor": "\u4e09\u83f1\u96fb\u6a5f", "version": null } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.97", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.04e", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-27040" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative", "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" } ], "trust": 7.0 }, "cve": "CVE-2021-27040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-27040", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-27040", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 4.2, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2021-27040", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 3.5, "userInteraction": "REQUIRED", "vectorString": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2021-27040", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2021-003350", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "ZDI", "id": "CVE-2021-27040", "trust": 4.2, "value": "HIGH" }, { "author": "ZDI", "id": "CVE-2021-27040", "trust": 3.5, "value": "LOW" }, { "author": "NVD", "id": "CVE-2021-27040", "trust": 1.0, "value": "LOW" }, { "author": "OTHER", "id": "JVNDB-2021-003350", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-1561", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A maliciously crafted DWG file can be forced to read beyond allocated boundaries when parsing the DWG file. This vulnerability can be exploited to execute arbitrary code. Provided by Mitsubishi Electric Corporation GENESIS64 and MC Works64 of AutoCAD (DWG) The file import feature contains several vulnerabilities: It was * Out-of-bounds read (CWE-125) - CVE-2021-27040 \u2025 * Out-of-bounds writing (CWE-787) - CVE-2021-27041 This vulnerability information is provided by the developer for the purpose of disseminating it to product users. JPCERT/CC Report to JPCERT/CC Coordinated with the developers.* Crafted by a third party AutoCAD (DWG) Information leaks by importing the file into the product - CVE-2021-27040* Crafted by a third party AutoCAD (DWG) By importing the file into the product, any program will be executed. - CVE-2021-27041. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DWG files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements", "sources": [ { "db": "NVD", "id": "CVE-2021-27040" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 9.09 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-27040", "trust": 10.1 }, { "db": "ZDI", "id": "ZDI-21-1238", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-21-1236", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-22-378", "trust": 2.3 }, { "db": "ZDI", "id": "ZDI-22-473", "trust": 2.3 }, { "db": "ICS CERT", "id": "ICSA-21-294-01", "trust": 1.4 }, { "db": "ZDI", "id": "ZDI-21-712", "trust": 1.3 }, { "db": "JVN", "id": "JVNVU94862669", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-003350", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12150", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12119", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-711", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12118", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-710", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12117", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-709", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12094", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-708", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12077", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-707", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-12076", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-706", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14065", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14060", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-14059", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-15570", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021102205", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062421", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022042625", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3527", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-1561", "trust": 0.6 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "id": "VAR-202106-1815", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.685964935 }, "last_update_date": "2022-05-16T22:51:40.714000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Autodesk has issued an update to correct this vulnerability.", "trust": 4.9, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 1.4, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01" }, { "title": "GENESIS64 and MC\u00a0Works64 of AutoCAD(DWG) Information leakage and malicious program execution vulnerability in file import function", "trust": 0.8, "url": "https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2021-017.pdf" }, { "title": "ICONICS has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-294-01" }, { "title": "Autodesk has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" }, { "title": "Autodesk AutoCAD Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155357" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202106-1561" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds writing (CWE-787) [ Other ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds read (CWE-125) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 7.3, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0004" }, { "trust": 2.8, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-294-01" }, { "trust": 2.2, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-1236/" }, { "trust": 2.2, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-378/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-1238/" }, { "trust": 1.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-22-473/" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu94862669/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27041" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27040" }, { "trust": 0.7, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-294-01" }, { "trust": 0.7, "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062421" }, { "trust": 0.6, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-712/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3527" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022042625" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021102205" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/iconics-genesis64-three-vulnerabilities-36698" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" }, { "db": "ZDI", "id": "ZDI-21-708" }, { "db": "ZDI", "id": "ZDI-21-707" }, { "db": "ZDI", "id": "ZDI-21-706" }, { "db": "ZDI", "id": "ZDI-21-1238" }, { "db": "ZDI", "id": "ZDI-21-1236" }, { "db": "ZDI", "id": "ZDI-22-378" }, { "db": "ZDI", "id": "ZDI-22-473" }, { "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "db": "NVD", "id": "CVE-2021-27040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-712" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-711" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-710" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-709" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-708" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-707" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-706" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1238" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1236" }, { "date": "2022-02-18T00:00:00", "db": "ZDI", "id": "ZDI-22-378" }, { "date": "2022-03-07T00:00:00", "db": "ZDI", "id": "ZDI-22-473" }, { "date": "2021-10-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-06-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "date": "2021-06-25T13:15:00", "db": "NVD", "id": "CVE-2021-27040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-712" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-711" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-710" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-709" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-708" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-707" }, { "date": "2021-06-22T00:00:00", "db": "ZDI", "id": "ZDI-21-706" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1238" }, { "date": "2021-10-28T00:00:00", "db": "ZDI", "id": "ZDI-21-1236" }, { "date": "2022-02-18T00:00:00", "db": "ZDI", "id": "ZDI-22-378" }, { "date": "2022-03-07T00:00:00", "db": "ZDI", "id": "ZDI-22-473" }, { "date": "2021-11-26T02:40:00", "db": "JVNDB", "id": "JVNDB-2021-003350" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1561" }, { "date": "2022-05-13T17:31:00", "db": "NVD", "id": "CVE-2021-27040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1561" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Autodesk AutoCAD DWG File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-712" }, { "db": "ZDI", "id": "ZDI-21-711" }, { "db": "ZDI", "id": "ZDI-21-710" }, { "db": "ZDI", "id": "ZDI-21-709" } ], "trust": 2.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }