Multiple vulnerabilities in Cognex 3D-A1000 Dimensioning System



Published: 2022-09-07
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-1368
CVE-2022-1522
CVE-2022-1525
CWE-ID CWE-306
CWE-117
CWE-602
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
3D-A1000 Dimensioning System
Hardware solutions / Security hardware applicances

Vendor Cognex Corporation

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Missing Authentication for Critical Function

EUVDB-ID: #VU67057

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1368

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to missing authentication for critical function. A remote attacker can change the operator account password via webserver commands by monitoring web socket communications from an unauthenticated session and gain elevated privileges on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

3D-A1000 Dimensioning System: 1.0.3 3354

External links

http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Output Neutralization for Logs

EUVDB-ID: #VU67058

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1522

CWE-ID: CWE-117 - Improper Output Neutralization for Logs

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the system.

The vulnerability exists due to improper output neutralization for logs. A remote attacker can create false logs that show the password as having been changed when it is not, complicating forensics.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

3D-A1000 Dimensioning System: 1.0.3 3354

External links

http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Client-Side Enforcement of Server-Side Security

EUVDB-ID: #VU67059

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1525

CWE-ID: CWE-602 - Client-Side Enforcement of Server-Side Security

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a client-side control issue. A remote attacker can inspec and modify the source code of password protected web elements and bypass web access controls.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

3D-A1000 Dimensioning System: 1.0.3 3354

External links

http://www.cisa.gov/uscert/ics/advisories/icsa-22-249-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###