ID

VAR-201903-1000


CVE

CVE-2018-14814


TITLE

WECON Technology PI Studio HMI and PI Studio Vulnerable to out-of-bounds reading

Trust: 0.8

sources: JVNDB: JVNDB-2018-015137

DESCRIPTION

WECON Technology PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior lacks proper validation of user-supplied data, which may result in a read past the end of an allocated object. WECON Technology PI Studio HMI and PI Studio Contains an out-of-bounds vulnerability.Information may be obtained. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Wecon PIStudio. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of images within DAT files. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of an administrator. The vulnerability stems from the program's failure to properly validate user-submitted data. No detailed vulnerability details are provided at this time. Failed exploit attempts will likely cause denial-of-service conditions

Trust: 3.24

sources: NVD: CVE-2018-14814 // JVNDB: JVNDB-2018-015137 // ZDI: ZDI-18-1108 // CNVD: CNVD-2019-44956 // BID: 105710 // IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b // CNVD: CNVD-2019-44956

AFFECTED PRODUCTS

vendor:we conmodel:pi studio hmiscope:lteversion:4.1.9

Trust: 1.0

vendor:we conmodel:pi studioscope:lteversion:4.2.34

Trust: 1.0

vendor:weconmodel:pi studioscope:lteversion:4.2.34

Trust: 0.8

vendor:weconmodel:pi studio hmiscope:lteversion:4.1.9

Trust: 0.8

vendor:weconmodel:pistudioscope: - version: -

Trust: 0.7

vendor:weconmodel:pi studio hmiscope:lteversion:<=4.1.9

Trust: 0.6

vendor:weconmodel:pi studioscope:lteversion:<=4.2.34

Trust: 0.6

vendor:weconmodel:pi studio hmi project programmerscope:eqversion:4.1.9

Trust: 0.3

vendor:weconmodel:pi studioscope:eqversion:4.2.34

Trust: 0.3

vendor:pi studiomodel: - scope:eqversion:*

Trust: 0.2

vendor:pi studio hmimodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b // ZDI: ZDI-18-1108 // CNVD: CNVD-2019-44956 // BID: 105710 // JVNDB: JVNDB-2018-015137 // NVD: CVE-2018-14814

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14814
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-14814
value: MEDIUM

Trust: 0.8

ZDI: CVE-2018-14814
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2019-44956
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201810-491
value: MEDIUM

Trust: 0.6

IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2018-14814
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2018-14814
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2

Trust: 0.7

CNVD: CNVD-2019-44956
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2018-14814
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b // ZDI: ZDI-18-1108 // CNVD: CNVD-2019-44956 // JVNDB: JVNDB-2018-015137 // CNNVD: CNNVD-201810-491 // NVD: CVE-2018-14814

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.8

sources: JVNDB: JVNDB-2018-015137 // NVD: CVE-2018-14814

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-491

TYPE

Buffer error

Trust: 0.8

sources: IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b // CNNVD: CNNVD-201810-491

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015137

PATCH

title:Top Pageurl:http://www.we-con.com.cn/en/

Trust: 0.8

title:Wecon has issued an update to correct this vulnerability. This vulnerability is being disclosed publicly without a patch in accordance with the ZDI 120 day deadline.05/18/18 - ZDI sent the report to ICS-CERT05/22/18 - ICS-CERT acknowledged, confirmed the report was sent to the vendor and sent an ICS-VU #09/17/18 - ZDI asked ICS-CERT to confirm the report remains unpatched and to advise the vendor of the intent to publish the report as 0-day on 10/02/18-- Mitigation:Given the nature of the vulnerability the only salient mitigation strategy is to restrict interaction with the application to trusted files.url:https://us-cert.cisa.gov/ics/advisories/ICSA-18-277-01

Trust: 0.7

sources: ZDI: ZDI-18-1108 // JVNDB: JVNDB-2018-015137

EXTERNAL IDS

db:NVDid:CVE-2018-14814

Trust: 4.2

db:ICS CERTid:ICSA-18-277-01

Trust: 3.3

db:CNVDid:CNVD-2019-44956

Trust: 0.8

db:CNNVDid:CNNVD-201810-491

Trust: 0.8

db:JVNDBid:JVNDB-2018-015137

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-6245

Trust: 0.7

db:ZDIid:ZDI-18-1108

Trust: 0.7

db:BIDid:105710

Trust: 0.3

db:IVDid:51B2D414-3909-4A29-AF6D-C70C0F4B727B

Trust: 0.2

sources: IVD: 51b2d414-3909-4a29-af6d-c70c0f4b727b // ZDI: ZDI-18-1108 // CNVD: CNVD-2019-44956 // BID: 105710 // JVNDB: JVNDB-2018-015137 // CNNVD: CNNVD-201810-491 // NVD: CVE-2018-14814

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-18-277-01

Trust: 3.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-14814

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14814

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-18-277-01

Trust: 0.7

url:http://www.we-con.com.cn/en/

Trust: 0.3

sources: ZDI: ZDI-18-1108 // CNVD: CNVD-2019-44956 // BID: 105710 // JVNDB: JVNDB-2018-015137 // CNNVD: CNNVD-201810-491 // NVD: CVE-2018-14814

CREDITS

Mat Powell - Trend Micro Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-18-1108

SOURCES

db:IVDid:51b2d414-3909-4a29-af6d-c70c0f4b727b
db:ZDIid:ZDI-18-1108
db:CNVDid:CNVD-2019-44956
db:BIDid:105710
db:JVNDBid:JVNDB-2018-015137
db:CNNVDid:CNNVD-201810-491
db:NVDid:CVE-2018-14814

LAST UPDATE DATE

2024-11-23T22:12:19.434000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-18-1108date:2021-12-02T00:00:00
db:CNVDid:CNVD-2019-44956date:2019-12-11T00:00:00
db:BIDid:105710date:2018-10-04T00:00:00
db:JVNDBid:JVNDB-2018-015137date:2019-04-26T00:00:00
db:CNNVDid:CNNVD-201810-491date:2019-10-10T00:00:00
db:NVDid:CVE-2018-14814date:2024-11-21T03:49:51.137

SOURCES RELEASE DATE

db:IVDid:51b2d414-3909-4a29-af6d-c70c0f4b727bdate:2019-12-11T00:00:00
db:ZDIid:ZDI-18-1108date:2018-10-02T00:00:00
db:CNVDid:CNVD-2019-44956date:2019-12-10T00:00:00
db:BIDid:105710date:2018-10-04T00:00:00
db:JVNDBid:JVNDB-2018-015137date:2019-04-26T00:00:00
db:CNNVDid:CNNVD-201810-491date:2018-10-10T00:00:00
db:NVDid:CVE-2018-14814date:2019-03-27T20:29:03.660