ID

VAR-201808-0380


CVE

CVE-2018-14795


TITLE

Emerson Electric Deltav Path traversal vulnerability

Trust: 1.4

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNVD: CNVD-2018-15736 // CNNVD: CNNVD-201808-563

DESCRIPTION

DeltaV Versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, and R5 is vulnerable due to improper path validation which may allow an attacker to replace executable files. DeltaV Contains a path traversal vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Emerson Electric DeltaV is a digital automation system from Emerson Electric. The system provides I/O on-demand configuration, embedded intelligent control and alarm panel functions. A path traversal vulnerability exists in Emerson Electric Deltav that stems from a program failing to validate the path. An attacker could exploit the vulnerability to replace the executable. Emerson DeltaV is prone to the following multiple security vulnerabilities: 1. An arbitrary-code-execution vulnerability 2. Multiple security-bypass vulnerabilities 3. A stack-based buffer-overflow vulnerability Attackers can exploit these issues to execute arbitrary code and bypass certain security restrictions, perform unauthorized actions, or gain sensitive information within the context of the affected system. Failed exploit attempts will likely result in denial of service conditions

Trust: 2.61

sources: NVD: CVE-2018-14795 // JVNDB: JVNDB-2018-009283 // CNVD: CNVD-2018-15736 // BID: 105105 // IVD: e2f86030-39ab-11e9-8c98-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNVD: CNVD-2018-15736

AFFECTED PRODUCTS

vendor:emersonmodel:deltavscope:eqversion:13.3.1

Trust: 2.7

vendor:emersonmodel:deltavscope:eqversion:11.3.1

Trust: 2.7

vendor:emersonmodel:deltavscope:eqversion:12.3.1

Trust: 2.7

vendor:emersonmodel:deltavscope:eqversion:13.3.0

Trust: 2.4

vendor:emersonmodel:deltavscope:eqversion:r5

Trust: 2.4

vendor:emersonmodel:electric deltavscope:eqversion:v11.3.1

Trust: 0.6

vendor:emersonmodel:electric deltavscope:eqversion:v12.3.1

Trust: 0.6

vendor:emersonmodel:electric deltavscope:eqversion:v13.3.0

Trust: 0.6

vendor:emersonmodel:electric deltavscope:eqversion:v13.3.1

Trust: 0.6

vendor:emersonmodel:electric deltav r5scope: - version: -

Trust: 0.6

vendor:emersonmodel:deltavscope:eqversion:13.3

Trust: 0.3

vendor:deltavmodel: - scope:eqversion:11.3.1

Trust: 0.2

vendor:deltavmodel: - scope:eqversion:12.3.1

Trust: 0.2

vendor:deltavmodel: - scope:eqversion:13.3.0

Trust: 0.2

vendor:deltavmodel: - scope:eqversion:13.3.1

Trust: 0.2

vendor:deltavmodel:r5scope: - version: -

Trust: 0.2

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNVD: CNVD-2018-15736 // BID: 105105 // JVNDB: JVNDB-2018-009283 // CNNVD: CNNVD-201808-563 // NVD: CVE-2018-14795

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14795
value: HIGH

Trust: 1.0

NVD: CVE-2018-14795
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-15736
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201808-563
value: HIGH

Trust: 0.6

IVD: e2f86030-39ab-11e9-8c98-000c29342cb1
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2018-14795
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-15736
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: e2f86030-39ab-11e9-8c98-000c29342cb1
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-14795
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNVD: CNVD-2018-15736 // JVNDB: JVNDB-2018-009283 // CNNVD: CNNVD-201808-563 // NVD: CVE-2018-14795

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

problemtype:CWE-23

Trust: 1.0

sources: JVNDB: JVNDB-2018-009283 // NVD: CVE-2018-14795

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201808-563

TYPE

Path traversal

Trust: 0.8

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNNVD: CNNVD-201808-563

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-009283

PATCH

title:DeltaVurl:https://www.emerson.com/en-us/automation/deltav

Trust: 0.8

title:Emerson Electric Deltav Path Traversal Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/138021

Trust: 0.6

title:Emerson Electric Deltav Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84151

Trust: 0.6

sources: CNVD: CNVD-2018-15736 // JVNDB: JVNDB-2018-009283 // CNNVD: CNNVD-201808-563

EXTERNAL IDS

db:NVDid:CVE-2018-14795

Trust: 3.5

db:ICS CERTid:ICSA-18-228-01

Trust: 3.3

db:BIDid:105105

Trust: 2.5

db:CNVDid:CNVD-2018-15736

Trust: 0.8

db:CNNVDid:CNNVD-201808-563

Trust: 0.8

db:JVNDBid:JVNDB-2018-009283

Trust: 0.8

db:IVDid:E2F86030-39AB-11E9-8C98-000C29342CB1

Trust: 0.2

sources: IVD: e2f86030-39ab-11e9-8c98-000c29342cb1 // CNVD: CNVD-2018-15736 // BID: 105105 // JVNDB: JVNDB-2018-009283 // CNNVD: CNNVD-201808-563 // NVD: CVE-2018-14795

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-228-01

Trust: 3.3

url:http://www.securityfocus.com/bid/105105

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14795

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-14795

Trust: 0.8

url:http://emerson.com

Trust: 0.3

sources: CNVD: CNVD-2018-15736 // BID: 105105 // JVNDB: JVNDB-2018-009283 // CNNVD: CNNVD-201808-563 // NVD: CVE-2018-14795

CREDITS

Ori Perez of CyberX,Younes Dragoni of Nozomi Networks, and Emerson.

Trust: 0.6

sources: CNNVD: CNNVD-201808-563

SOURCES

db:IVDid:e2f86030-39ab-11e9-8c98-000c29342cb1
db:CNVDid:CNVD-2018-15736
db:BIDid:105105
db:JVNDBid:JVNDB-2018-009283
db:CNNVDid:CNNVD-201808-563
db:NVDid:CVE-2018-14795

LAST UPDATE DATE

2024-11-23T21:52:55.802000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-15736date:2018-08-21T00:00:00
db:BIDid:105105date:2018-08-16T00:00:00
db:JVNDBid:JVNDB-2018-009283date:2018-11-14T00:00:00
db:CNNVDid:CNNVD-201808-563date:2019-10-17T00:00:00
db:NVDid:CVE-2018-14795date:2024-11-21T03:49:48.643

SOURCES RELEASE DATE

db:IVDid:e2f86030-39ab-11e9-8c98-000c29342cb1date:2018-08-21T00:00:00
db:CNVDid:CNVD-2018-15736date:2018-08-21T00:00:00
db:BIDid:105105date:2018-08-16T00:00:00
db:JVNDBid:JVNDB-2018-009283date:2018-11-14T00:00:00
db:CNNVDid:CNNVD-201808-563date:2018-08-20T00:00:00
db:NVDid:CVE-2018-14795date:2018-08-21T14:29:01.357