Untrusted search path in Omron Network Configurator for DeviceNet



Published: 2019-05-30
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2019-10971
CWE-ID CWE-426
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Network Configurator for DeviceNet
Server applications / SCADA systems

Vendor Omron

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Untrusted search path

EUVDB-ID: #VU18643

Risk: Medium

CVSSv3.1: 6.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2019-10971

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to data files or modify configuration.

The vulnerability exists due to executed malicious .dll file passed via untrusted search path. A remote attacker can modify search path to point to a malicious program in order to execute their own programs, access unauthorized data files, or modify configuration in unexpected ways.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Network Configurator for DeviceNet: 3.41

External links

http://ics-cert.us-cert.gov/advisories/ICSA-19-134-01


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###