Stack-based buffer overflow in Omron products - CVE-2018-7514

 

Stack-based buffer overflow in Omron products - CVE-2018-7514

Published: April 12, 2018


Vulnerability identifier: #VU11778
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-7514
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Omron
Affected software:
CX-One
CX-FLnet
CX-Protocol
CX-Programmer
Network Configurator
CX-Server
Switch Box Utility

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack-based buffer overflow. A remote attacker can parse specially crafted project files and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

How to mitigate CVE-2018-7514

Update CX-FLnet to 1.10, CX-Protocol to 1.993, CX-Programmer to 9.66, Common Module including CX-Server to 5.0.23, Network Configurator to 3.64 and Switch Box Utility to 1.69.

Sources