ID

VAR-201401-0055


CVE

CVE-2013-2827


TITLE

plural WellinTech Product ActiveX Any in control DLL Code download vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2014-001176

DESCRIPTION

An unspecified ActiveX control in WellinTech KingSCADA before 3.1.2, KingAlarm&Event before 3.1, and KingGraphic before 3.1.2 allows remote attackers to download arbitrary DLL code onto a client machine and execute this code via the ProjectURL property value. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the kxClientDownload.ocx ActiveX control. An attacker can leverage this vulnerability to execute code under the context of the administrator. KingSCADA is a versatile industrial monitoring software that integrates process control design, field operations and plant resource management. KingGraphic can access data from multiple industrial real-time databases and relational databases. Multiple WellinTech products are prone to a remote code-execution vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Failed exploit attempts will likely result in denial-of-service conditions

Trust: 3.24

sources: NVD: CVE-2013-2827 // JVNDB: JVNDB-2014-001176 // ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // BID: 64941 // IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00422

AFFECTED PRODUCTS

vendor:wellintechmodel:kingscadascope:eqversion:3.1

Trust: 1.2

vendor:wellintechmodel:kinggraphicscope:eqversion:3.1

Trust: 1.2

vendor:wellintechmodel:kinggraphicscope:lteversion:3.1

Trust: 1.0

vendor:wellintechmodel:kingalarm\&eventscope:lteversion:2.0.2

Trust: 1.0

vendor:wellintechmodel:kingscadascope:lteversion:3.1

Trust: 1.0

vendor:wellintechmodel:kingalarm&eventscope:ltversion:3.1

Trust: 0.8

vendor:wellintechmodel:kinggraphicscope:ltversion:3.1.2

Trust: 0.8

vendor:wellintechmodel:kingscadascope:ltversion:3.1.2

Trust: 0.8

vendor:wellintechmodel:kingscada kinggraphicscope: - version: -

Trust: 0.7

vendor:wellintechmodel:kingalarm&eventscope:eqversion:2.0.2

Trust: 0.6

vendor:wellintechmodel:kingalarm\&eventscope:eqversion:2.0.2

Trust: 0.6

vendor:wellintechmodel:kingscadascope:eqversion:3.0

Trust: 0.3

vendor:kingalarm eventmodel: - scope:eqversion:*

Trust: 0.2

vendor:kinggraphicmodel: - scope:eqversion:*

Trust: 0.2

vendor:kingscadamodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // BID: 64941 // JVNDB: JVNDB-2014-001176 // CNNVD: CNNVD-201401-298 // NVD: CVE-2013-2827

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-2827
value: HIGH

Trust: 1.0

NVD: CVE-2013-2827
value: HIGH

Trust: 0.8

ZDI: CVE-2013-2827
value: HIGH

Trust: 0.7

CNVD: CNVD-2014-00422
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201401-298
value: HIGH

Trust: 0.6

IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2013-2827
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2014-00422
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // JVNDB: JVNDB-2014-001176 // CNNVD: CNNVD-201401-298 // NVD: CVE-2013-2827

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2014-001176 // NVD: CVE-2013-2827

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-298

TYPE

Code injection

Trust: 0.8

sources: IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201401-298

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001176

PATCH

title:Top Pageurl:http://www.wellintech.com/

Trust: 0.8

title:Top Pageurl:http://www.wellintech.co.jp/

Trust: 0.8

title:WellinTech has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-13-344-01

Trust: 0.7

title:Patch of multiple WellinTech product ActiveX remote code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/42551

Trust: 0.6

title:KingGraphic3.1.2_ENurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47598

Trust: 0.6

title:KingAlarm&Event3.1_ENurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47597

Trust: 0.6

title:KingSCADA3.1.2_ENurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47596

Trust: 0.6

sources: ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // JVNDB: JVNDB-2014-001176 // CNNVD: CNNVD-201401-298

EXTERNAL IDS

db:NVDid:CVE-2013-2827

Trust: 4.2

db:ICS CERTid:ICSA-13-344-01

Trust: 3.0

db:BIDid:64941

Trust: 0.9

db:CNVDid:CNVD-2014-00422

Trust: 0.8

db:CNNVDid:CNNVD-201401-298

Trust: 0.8

db:JVNDBid:JVNDB-2014-001176

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1552

Trust: 0.7

db:ZDIid:ZDI-14-011

Trust: 0.7

db:SECUNIAid:56443

Trust: 0.6

db:IVDid:4C4FAA70-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 4c4faa70-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // BID: 64941 // JVNDB: JVNDB-2014-001176 // CNNVD: CNNVD-201401-298 // NVD: CVE-2013-2827

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-13-344-01

Trust: 3.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2827

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-2827

Trust: 0.8

url:http://secunia.com/advisories/56443/

Trust: 0.6

sources: ZDI: ZDI-14-011 // CNVD: CNVD-2014-00422 // JVNDB: JVNDB-2014-001176 // CNNVD: CNNVD-201401-298 // NVD: CVE-2013-2827

CREDITS

Andrea Micalizzi aka rgod

Trust: 0.7

sources: ZDI: ZDI-14-011

SOURCES

db:IVDid:4c4faa70-2352-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-011
db:CNVDid:CNVD-2014-00422
db:BIDid:64941
db:JVNDBid:JVNDB-2014-001176
db:CNNVDid:CNNVD-201401-298
db:NVDid:CVE-2013-2827

LAST UPDATE DATE

2025-04-11T23:05:34.391000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-011date:2014-02-05T00:00:00
db:CNVDid:CNVD-2014-00422date:2014-01-17T00:00:00
db:BIDid:64941date:2014-08-01T01:11:00
db:JVNDBid:JVNDB-2014-001176date:2014-01-20T00:00:00
db:CNNVDid:CNNVD-201401-298date:2014-01-24T00:00:00
db:NVDid:CVE-2013-2827date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:IVDid:4c4faa70-2352-11e6-abef-000c29c66e3ddate:2014-01-17T00:00:00
db:ZDIid:ZDI-14-011date:2014-02-05T00:00:00
db:CNVDid:CNVD-2014-00422date:2014-01-17T00:00:00
db:BIDid:64941date:2014-01-14T00:00:00
db:JVNDBid:JVNDB-2014-001176date:2014-01-20T00:00:00
db:CNNVDid:CNNVD-201401-298date:2014-01-20T00:00:00
db:NVDid:CVE-2013-2827date:2014-01-15T16:08:18.173