ID

VAR-201805-0946


CVE

CVE-2018-8867


TITLE

plural GE Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-005302

DESCRIPTION

In GE PACSystems RX3i CPE305/310 version 9.20 and prior, RX3i CPE330 version 9.21 and prior, RX3i CPE 400 version 9.30 and prior, PACSystems RSTi-EP CPE 100 all versions, and PACSystems CPU320/CRU320 RXi all versions, the device does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable. plural GE The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. PACSystems RX3i CPE305/310, RX3i CPE330, RX3i CPE 400 are all GE programmable programmable controller products. GE PACSystems are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause the device to reboot and change its state, denying service to legitimate users. GE PACSystems RX3i CPE305, etc. A security vulnerability exists in several GE products due to the program not properly validating input

Trust: 2.7

sources: NVD: CVE-2018-8867 // JVNDB: JVNDB-2018-005302 // CNVD: CNVD-2018-10002 // BID: 104241 // IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // VULHUB: VHN-138899

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // CNVD: CNVD-2018-10002

AFFECTED PRODUCTS

vendor:gemodel:pacsystems rsti-ep cpe 100scope:eqversion: -

Trust: 1.6

vendor:gemodel:pacsystems cru320scope:eqversion: -

Trust: 1.6

vendor:gemodel:pacsystems cpu320scope:eqversion: -

Trust: 1.6

vendor:gemodel:pacsystems rxiscope:eqversion: -

Trust: 1.6

vendor:gemodel:pacsystems rx3i cpe310scope:lteversion:9.20

Trust: 1.0

vendor:gemodel:rx3i cpe 400scope:lteversion:9.30

Trust: 1.0

vendor:gemodel:pacsystems rx3i cpe305scope:lteversion:9.20

Trust: 1.0

vendor:gemodel:rx3i cpe330scope:lteversion:9.21

Trust: 1.0

vendor:general electricmodel:pacsystems cpu320scope:eqversion: -

Trust: 0.8

vendor:general electricmodel:pacsystems cru320scope:eqversion: -

Trust: 0.8

vendor:general electricmodel:pacsystems rsti-ep cpe 100scope:eqversion: -

Trust: 0.8

vendor:general electricmodel:pacsystems rx3i cpe305scope:lteversion:9.20

Trust: 0.8

vendor:general electricmodel:pacsystems rx3i cpe310scope:lteversion:9.20

Trust: 0.8

vendor:general electricmodel:pacsystems rxiscope:eqversion: -

Trust: 0.8

vendor:general electricmodel:rx3i cpe 400scope:lteversion:9.30

Trust: 0.8

vendor:general electricmodel:rx3i cpe330scope:lteversion:9.21

Trust: 0.8

vendor:gemodel:pacsystems rx3i cpe305/310scope:lteversion:<=9.20

Trust: 0.6

vendor:gemodel:rx3i cpe330scope:lteversion:<=9.21

Trust: 0.6

vendor:gemodel:rx3i cpescope:eqversion:400<=9.30

Trust: 0.6

vendor:gemodel:pacsystems rsti-ep cpescope:eqversion:100

Trust: 0.6

vendor:gemodel:pacsystems cpu320/cru320 rxiscope: - version: -

Trust: 0.6

vendor:gemodel:pacsystems rx3i cpe305scope:eqversion:9.20

Trust: 0.6

vendor:gemodel:pacsystems rx3i cpe310scope:eqversion:9.20

Trust: 0.6

vendor:gemodel:rx3i cpe 400scope:eqversion:9.30

Trust: 0.6

vendor:gemodel:rx3i cpe330scope:eqversion:9.21

Trust: 0.6

vendor:generalmodel:electric pacsystems rxi cru320scope:eqversion:0

Trust: 0.3

vendor:generalmodel:electric pacsystems rxi cpu320scope:eqversion:0

Trust: 0.3

vendor:generalmodel:electric pacsystems rx3i cpe400scope:eqversion:9.30

Trust: 0.3

vendor:generalmodel:electric pacsystems rx3i cpe330scope:eqversion:9.21

Trust: 0.3

vendor:generalmodel:electric pacsystems rx3i cpe310scope:eqversion:9.20

Trust: 0.3

vendor:generalmodel:electric pacsystems rx3i cpe305scope:eqversion:9.20

Trust: 0.3

vendor:generalmodel:electric pacsystems rsti-ep cpe100scope:eqversion:0

Trust: 0.3

vendor:pacsystems rx3i cpe305model: - scope:eqversion:*

Trust: 0.2

vendor:pacsystems rx3i cpe310model: - scope:eqversion:*

Trust: 0.2

vendor:rx3i cpe330model: - scope:eqversion:*

Trust: 0.2

vendor:rx3i cpe 400model: - scope:eqversion:*

Trust: 0.2

vendor:pacsystems rsti ep cpe 100model: - scope:eqversion: -

Trust: 0.2

vendor:pacsystems cpu320model: - scope:eqversion: -

Trust: 0.2

vendor:pacsystems cru320model: - scope:eqversion: -

Trust: 0.2

vendor:pacsystems rximodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // CNVD: CNVD-2018-10002 // BID: 104241 // JVNDB: JVNDB-2018-005302 // CNNVD: CNNVD-201805-657 // NVD: CVE-2018-8867

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-8867
value: HIGH

Trust: 1.0

NVD: CVE-2018-8867
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-10002
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201805-657
value: HIGH

Trust: 0.6

IVD: e2efad9f-39ab-11e9-a104-000c29342cb1
value: HIGH

Trust: 0.2

VULHUB: VHN-138899
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-8867
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-10002
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2efad9f-39ab-11e9-a104-000c29342cb1
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VHN-138899
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-8867
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // CNVD: CNVD-2018-10002 // VULHUB: VHN-138899 // JVNDB: JVNDB-2018-005302 // CNNVD: CNNVD-201805-657 // NVD: CVE-2018-8867

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-138899 // JVNDB: JVNDB-2018-005302 // NVD: CVE-2018-8867

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201805-657

TYPE

Input validation error

Trust: 1.1

sources: IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // BID: 104241 // CNNVD: CNNVD-201805-657

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-005302

PATCH

title:Top Pageurl:http://www.geautomation.com/

Trust: 0.8

title:GE's various PACSystems products enter patches for verification error vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/129709

Trust: 0.6

title:Multiple GE Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83577

Trust: 0.6

sources: CNVD: CNVD-2018-10002 // JVNDB: JVNDB-2018-005302 // CNNVD: CNNVD-201805-657

EXTERNAL IDS

db:NVDid:CVE-2018-8867

Trust: 3.6

db:ICS CERTid:ICSA-18-137-01

Trust: 3.4

db:BIDid:104241

Trust: 2.0

db:CNNVDid:CNNVD-201805-657

Trust: 0.9

db:CNVDid:CNVD-2018-10002

Trust: 0.8

db:JVNDBid:JVNDB-2018-005302

Trust: 0.8

db:IVDid:E2EFAD9F-39AB-11E9-A104-000C29342CB1

Trust: 0.2

db:SEEBUGid:SSVID-98955

Trust: 0.1

db:VULHUBid:VHN-138899

Trust: 0.1

sources: IVD: e2efad9f-39ab-11e9-a104-000c29342cb1 // CNVD: CNVD-2018-10002 // VULHUB: VHN-138899 // BID: 104241 // JVNDB: JVNDB-2018-005302 // CNNVD: CNNVD-201805-657 // NVD: CVE-2018-8867

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-137-01

Trust: 3.4

url:http://www.securityfocus.com/bid/104241

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-8867

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-8867

Trust: 0.8

url:http://www.ge.com/

Trust: 0.3

sources: CNVD: CNVD-2018-10002 // VULHUB: VHN-138899 // BID: 104241 // JVNDB: JVNDB-2018-005302 // CNNVD: CNNVD-201805-657 // NVD: CVE-2018-8867

CREDITS

Younes Dragoni of Nozomi Networks.

Trust: 0.3

sources: BID: 104241

SOURCES

db:IVDid:e2efad9f-39ab-11e9-a104-000c29342cb1
db:CNVDid:CNVD-2018-10002
db:VULHUBid:VHN-138899
db:BIDid:104241
db:JVNDBid:JVNDB-2018-005302
db:CNNVDid:CNNVD-201805-657
db:NVDid:CVE-2018-8867

LAST UPDATE DATE

2024-11-23T22:22:05.146000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-10002date:2018-05-22T00:00:00
db:VULHUBid:VHN-138899date:2019-10-09T00:00:00
db:BIDid:104241date:2018-05-17T00:00:00
db:JVNDBid:JVNDB-2018-005302date:2018-07-11T00:00:00
db:CNNVDid:CNNVD-201805-657date:2019-10-17T00:00:00
db:NVDid:CVE-2018-8867date:2024-11-21T04:14:29.243

SOURCES RELEASE DATE

db:IVDid:e2efad9f-39ab-11e9-a104-000c29342cb1date:2018-05-22T00:00:00
db:CNVDid:CNVD-2018-10002date:2018-05-22T00:00:00
db:VULHUBid:VHN-138899date:2018-05-18T00:00:00
db:BIDid:104241date:2018-05-17T00:00:00
db:JVNDBid:JVNDB-2018-005302date:2018-07-11T00:00:00
db:CNNVDid:CNNVD-201805-657date:2018-05-21T00:00:00
db:NVDid:CVE-2018-8867date:2018-05-18T20:29:00.323