Remote code execution in GE D60 Line Distance Relay



Published: 2018-02-16
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2018-5475
CVE-2018-5473
CWE-ID CWE-121
CWE-120
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
D60 Line Distance Relay
Hardware solutions / Firmware

Vendor GE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Stack-based buffer overflow

EUVDB-ID: #VU10619

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-5475

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to multiple stack-based buffer overflows. A remote attacker can trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.
https://www.gegridsolutions.com/app/ViewFiles.aspx?prod=d60&type=7

Vulnerable software versions

D60 Line Distance Relay: 7.0 - 7.11

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-046-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU10620

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-5473

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow when handling malicious input. A remote attacker can send specially crafted files, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.
https://www.gegridsolutions.com/app/ViewFiles.aspx?prod=d60&type=7

Vulnerable software versions

D60 Line Distance Relay: 7.0 - 7.11

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-046-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###