Multiple vulnerabilities in Omron CX-One

Published: 2018-04-12 11:22:14
Severity High
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2018-8834
CVE-2018-7514
CVE-2018-7530
CVSSv3 8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-122
CWE-121
CWE-843
Exploitation vector Network
Public exploit Not available
Vulnerable software CX-One
CX-FLnet
CX-Protocol
CX-Programmer
CX-Server
Network Configurator
Switch Box Utility
Vulnerable software versions CX-One 4.42
CX-FLnet 1.00
CX-Protocol 1.992
CX-Programmer 9.65
CX-Server 5.0.22
Network Configurator 3.63
Switch Box Utility 1.68
Vendor URL Omron

Security Advisory

1) Heap-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to heap-based buffer overflow. A remote attacker can parse specially crafted project files and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update CX-FLnet to 1.10, CX-Protocol to 1.993, CX-Programmer to 9.66, Common Module including CX-Server to 5.0.23, Network Configurator to 3.64 and Switch Box Utility to 1.69.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02

2) Stack-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack-based buffer overflow. A remote attacker can parse specially crafted project files and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update CX-FLnet to 1.10, CX-Protocol to 1.993, CX-Programmer to 9.66, Common Module including CX-Server to 5.0.23, Network Configurator to 3.64 and Switch Box Utility to 1.69.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02

3) Type confusion

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to type confusion. A remote attacker can parse specially crafted project files, allow the pointer to call an incorrect object and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update CX-FLnet to 1.10, CX-Protocol to 1.993, CX-Programmer to 9.66, Common Module including CX-Server to 5.0.23, Network Configurator to 3.64 and Switch Box Utility to 1.69.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02

Back to List