Multiple vulnerabilities in Mitsubishi Electric FR Configurator2



Published: 2019-07-29
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2019-10976
CVE-2019-10972
CWE-ID CWE-611
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Mitsubishi Electric FR Configurator2
Client/Desktop applications / Software for system administration

Vendor Mitsubishi Electric

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) XML External Entity injection

EUVDB-ID: #VU19522

Risk: Medium

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10976

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to sensitive information.

The vulnerability exists due to the input passed to the XML parser is not sanitized while parsing the XML project and/or template file (.frc2). A remote attacker can trick a victim to open a specially crafted file and read arbitrary files on the target system.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mitsubishi Electric FR Configurator2: 1.16S

External links

http://www.mitsubishielectric.com/fa/download/software/drv/inv/vulnerability-protection/2019-001.pd...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource exhaustion

EUVDB-ID: #VU19524

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-10972

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a local attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the CPU exhaustion when an attacker provides the target with a rogue project file (.frc2). A remote attacker can trick a victim to open the rogue project, trigger CPU exhaustion and cause the software to quit responding until the application is restarted.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Mitsubishi Electric FR Configurator2: 1.16S

External links

http://www.mitsubishielectric.com/fa/download/software/drv/inv/vulnerability-protection/2019-001.pd...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###