Stack-based buffer overflow in ControlWave Micro - CVE-2018-5452
Published: February 28, 2018
Vulnerability identifier: #VU10786
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-5452
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Emerson
Affected software:
ControlWave Micro
ControlWave Micro
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to stack-based buffer overflow. A remote attacker can send specially crafted packets on Port 20547 and force the PLC to change its state into halt mode.
The weakness exists due to stack-based buffer overflow. A remote attacker can send specially crafted packets on Port 20547 and force the PLC to change its state into halt mode.
How to mitigate CVE-2018-5452
Emerson offers the following mitigation advice:
- Assess which ControlWave products in your organization have Ethernet connectivity.
- Upgrade the affected devices to firmware version 05.79.00 to correct this possible action. System firmware upgrade instructions are available in product documentation (ControlWave Micro Process Automation Controller Instruction Manual, part D301392X012).
- The resolution described is available only to the user when appropriately incorporated into the application running in ControlWave Micro firmware.
- Prior to upgrading the system firmware, always perform a full alarm and historical collection (archive files as well as audit logs).