VAR-201804-1656

Vulnerability from variot - Updated: 2023-12-18 12:18

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability 2. A heap-based buffer-overflow vulnerability 3

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201804-1656",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "model": "cx-one",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "model": "cx-server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "model": "network configurator",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "model": "switch box utility",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "model": "switch box utility",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.68"
      },
      {
        "model": "network configurator",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "3.63"
      },
      {
        "model": "cx-server",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "5.0.22"
      },
      {
        "model": "cx-protocol",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.992"
      },
      {
        "model": "cx-programmer",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "9.65"
      },
      {
        "model": "cx-one",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "4.42"
      },
      {
        "model": "cx-flnet",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "omron",
        "version": "1.00"
      },
      {
        "model": "cx-flnet",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.00"
      },
      {
        "model": "cx-programmer",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 9.65"
      },
      {
        "model": "cx-protocol",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.992"
      },
      {
        "model": "cx-server",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 5.0.22"
      },
      {
        "model": "network configurator",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 3.63"
      },
      {
        "model": "switch box utility",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "omron",
        "version": "version 1.68"
      },
      {
        "model": "cx-one",
        "scope": null,
        "trust": 0.7,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-flnet",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-protocol",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-programmer",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-server",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "network configurator",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "switch box utility",
        "scope": null,
        "trust": 0.6,
        "vendor": "omron",
        "version": null
      },
      {
        "model": "cx-one",
        "scope": "lte",
        "trust": 0.6,
        "vendor": "omron",
        "version": "\u003c=4.42"
      },
      {
        "model": "switch box utility",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.69"
      },
      {
        "model": "network configurator",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "3.64"
      },
      {
        "model": "cx-server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "5.0.23"
      },
      {
        "model": "cx-protocol",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.993"
      },
      {
        "model": "cx-programmer",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "9.66"
      },
      {
        "model": "cx-flnet",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "omron",
        "version": "1.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx flnet",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx one",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx programmer",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx protocol",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "cx server",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "network configurator",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "switch box utility",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:omron:switch_box_utility:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.68",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:cx-server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "5.0.22",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:cx-programmer:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "9.65",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:cx-protocol:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.992",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:cx-flnet:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.00",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:cx-one:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "4.42",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:omron:network_configurator:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "3.63",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "rgod",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2018-7530",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "JPCERT/CC",
            "availabilityImpact": "Partial",
            "baseScore": 6.8,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 2.4,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "ZDI",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-7530",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 0.7,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2018-07873",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-137562",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "JPCERT/CC",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2018-002441",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 2.4,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "JPCERT/CC",
            "id": "JVNDB-2018-002441",
            "trust": 2.4,
            "value": "Medium"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7530",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "ZDI",
            "id": "CVE-2018-7530",
            "trust": 0.7,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-07873",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201804-791",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137562",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition. Provided by OMRON Corporation CX-One The following applications contain several vulnerabilities: * Stack-based buffer overflow (CWE-121) - CVE-2018-7514 Stack-based buffer overflows can occur due to processing of specially crafted project files. * Accessing resources using inappropriate types ( Mixing of molds ) (CWE-843) - CVE-2018-7530 Due to the processing of a specially crafted project file, access to the outside of the memory area may occur by calling an object with an incorrect type. * Heap-based buffer overflow (CWE-122) - CVE-2018-8834 A heap-based buffer overflow can occur due to the processing of a specially crafted project file.A remote attacker could execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of OMRON CX-One. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of PSW files. When parsing a crafted file, the process does not properly validate user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code under the context of the current process. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-FLnet, etc. are all integrated applications. There are security vulnerabilities in multiple softwares in Omron CX-One 4.42 and earlier. A stack-based buffer-overflow vulnerability\n2. A heap-based buffer-overflow vulnerability\n3",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 3.33
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7530",
        "trust": 4.3
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-18-100-02",
        "trust": 3.4
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU95484528",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-5404",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "103970",
        "trust": 0.3
      },
      {
        "db": "IVD",
        "id": "E2EBDD12-39AB-11E9-8F48-000C29342CB1",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "id": "VAR-201804-1656",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      }
    ],
    "trust": 1.4294842983333333
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:18:55.676000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Network Configurator \u306e\u66f4\u65b0\u5185\u5bb9: Ver.3.64 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#network_configurator"
      },
      {
        "title": "SwitchBoxUtility \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.69 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#switchboxutility"
      },
      {
        "title": "\u5171\u901a\u30e2\u30b8\u30e5\u30fc\u30eb \u306e\u66f4\u65b0\u5185\u5bb9: \u2212 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#common_module"
      },
      {
        "title": "CX-FLnet \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.10 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_flnet"
      },
      {
        "title": "CX-One \u30d0\u30fc\u30b8\u30e7\u30f3\u30a2\u30c3\u30d7 \u30d7\u30ed\u30b0\u30e9\u30e0 \u30c0\u30a6\u30f3\u30ed\u30fc\u30c9",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/one1.html"
      },
      {
        "title": "CX-Programmer \u306e\u66f4\u65b0\u5185\u5bb9: Ver.9.66 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_programmer"
      },
      {
        "title": "CX-Protocol \u306e\u66f4\u65b0\u5185\u5bb9: Ver.1.993 : CX-One\u30aa\u30fc\u30c8\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08V4\u5411\u3051_2018\u5e744\u6708\uff09",
        "trust": 0.8,
        "url": "https://www.fa.omron.co.jp/product/tool/26/cxone/j4_doc.html#cx_protocol"
      },
      {
        "title": "OMRON has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "title": "Omron CX-One code execution hole patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/126153"
      },
      {
        "title": "Omron CX-One Fixes for multiple software security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=80160"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-118",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-121",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-122",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-843",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 4.1,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-100-02"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8834"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95484528/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7514"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7530"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8834"
      },
      {
        "trust": 0.3,
        "url": "https://industrial.omron.eu/"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "db": "BID",
        "id": "103970"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-04-19T00:00:00",
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "date": "2018-04-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970"
      },
      {
        "date": "2018-04-12T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "date": "2018-04-17T19:29:00.387000",
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "date": "2018-04-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-04-11T00:00:00",
        "db": "ZDI",
        "id": "ZDI-18-283"
      },
      {
        "date": "2018-04-19T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137562"
      },
      {
        "date": "2018-04-10T00:00:00",
        "db": "BID",
        "id": "103970"
      },
      {
        "date": "2018-08-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002441"
      },
      {
        "date": "2019-10-09T23:42:23.613000",
        "db": "NVD",
        "id": "CVE-2018-7530"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Omron CX-One Code execution hole",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-07873"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Code problem",
    "sources": [
      {
        "db": "IVD",
        "id": "e2ebdd12-39ab-11e9-8f48-000c29342cb1"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201804-791"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…