ID

VAR-202208-1938


CVE

CVE-2022-2866


TITLE

Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Trust: 5.6

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167

DESCRIPTION

FATEK FvDesigner version 1.5.103 and prior is vulnerable to an out-of-bounds write while processing project files. If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution. FATEK Automation Provided by the company FvDesigner The following vulnerabilities exist in. It was * Out-of-bounds writing (CWE-787) - CVE-2022-2866If the vulnerability is exploited, it may be affected as follows. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. FATEK Automation FvDesigner

Trust: 6.75

sources: NVD: CVE-2022-2866 // JVNDB: JVNDB-2022-002343 // ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // VULMON: CVE-2022-2866

AFFECTED PRODUCTS

vendor:fatek automationmodel:fvdesignerscope: - version: -

Trust: 5.6

vendor:fatekmodel:fvdesignerscope:lteversion:1.5.103

Trust: 1.0

vendor:fatek automationmodel:fvdesignerscope:lteversion:1.5.103 and earlier s

Trust: 0.8

vendor:fatek automationmodel:fvdesignerscope:eqversion: -

Trust: 0.8

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // JVNDB: JVNDB-2022-002343 // NVD: CVE-2022-2866

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2022-2866
value: HIGH

Trust: 5.6

nvd@nist.gov: CVE-2022-2866
value: HIGH

Trust: 1.0

ics-cert@hq.dhs.gov: CVE-2022-2866
value: HIGH

Trust: 1.0

NVD: CVE-2022-2866
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202208-4054
value: HIGH

Trust: 0.6

ZDI: CVE-2022-2866
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 5.6

nvd@nist.gov: CVE-2022-2866
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-2866
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // JVNDB: JVNDB-2022-002343 // CNNVD: CNNVD-202208-4054 // NVD: CVE-2022-2866 // NVD: CVE-2022-2866

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-002343 // NVD: CVE-2022-2866

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202208-4054

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202208-4054

PATCH

title:Fatek Automation has issued an update to correct this vulnerability.url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-237-01

Trust: 5.6

title:Contact Usurl:https://www.fatek.com/en/contact_us.php

Trust: 0.8

title:FATEK FvDesigner Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=205597

Trust: 0.6

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // JVNDB: JVNDB-2022-002343 // CNNVD: CNNVD-202208-4054

EXTERNAL IDS

db:NVDid:CVE-2022-2866

Trust: 8.9

db:ICS CERTid:ICSA-22-237-01

Trust: 2.5

db:JVNid:JVNVU99486681

Trust: 0.8

db:JVNDBid:JVNDB-2022-002343

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16362

Trust: 0.7

db:ZDIid:ZDI-22-1174

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16361

Trust: 0.7

db:ZDIid:ZDI-22-1173

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16360

Trust: 0.7

db:ZDIid:ZDI-22-1172

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16358

Trust: 0.7

db:ZDIid:ZDI-22-1171

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16304

Trust: 0.7

db:ZDIid:ZDI-22-1170

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16296

Trust: 0.7

db:ZDIid:ZDI-22-1169

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16271

Trust: 0.7

db:ZDIid:ZDI-22-1168

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-16270

Trust: 0.7

db:ZDIid:ZDI-22-1167

Trust: 0.7

db:AUSCERTid:ESB-2022.4246

Trust: 0.6

db:CNNVDid:CNNVD-202208-4054

Trust: 0.6

db:VULMONid:CVE-2022-2866

Trust: 0.1

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // VULMON: CVE-2022-2866 // JVNDB: JVNDB-2022-002343 // CNNVD: CNNVD-202208-4054 // NVD: CVE-2022-2866

REFERENCES

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-237-01

Trust: 8.1

url:http://jvn.jp/vu/jvnvu99486681/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-2866

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-237-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4246

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-2866/

Trust: 0.6

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167 // VULMON: CVE-2022-2866 // JVNDB: JVNDB-2022-002343 // CNNVD: CNNVD-202208-4054 // NVD: CVE-2022-2866

CREDITS

Anonymous

Trust: 5.6

sources: ZDI: ZDI-22-1174 // ZDI: ZDI-22-1173 // ZDI: ZDI-22-1172 // ZDI: ZDI-22-1171 // ZDI: ZDI-22-1170 // ZDI: ZDI-22-1169 // ZDI: ZDI-22-1168 // ZDI: ZDI-22-1167

SOURCES

db:ZDIid:ZDI-22-1174
db:ZDIid:ZDI-22-1173
db:ZDIid:ZDI-22-1172
db:ZDIid:ZDI-22-1171
db:ZDIid:ZDI-22-1170
db:ZDIid:ZDI-22-1169
db:ZDIid:ZDI-22-1168
db:ZDIid:ZDI-22-1167
db:VULMONid:CVE-2022-2866
db:JVNDBid:JVNDB-2022-002343
db:CNNVDid:CNNVD-202208-4054
db:NVDid:CVE-2022-2866

LAST UPDATE DATE

2024-08-14T14:43:47.935000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1174date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1173date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1172date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1171date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1170date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1169date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1168date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1167date:2022-08-25T00:00:00
db:JVNDBid:JVNDB-2022-002343date:2024-06-13T07:40:00
db:CNNVDid:CNNVD-202208-4054date:2022-09-05T00:00:00
db:NVDid:CVE-2022-2866date:2022-09-02T22:02:57.273

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1174date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1173date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1172date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1171date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1170date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1169date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1168date:2022-08-25T00:00:00
db:ZDIid:ZDI-22-1167date:2022-08-25T00:00:00
db:JVNDBid:JVNDB-2022-002343date:2022-08-29T00:00:00
db:CNNVDid:CNNVD-202208-4054date:2022-08-25T00:00:00
db:NVDid:CVE-2022-2866date:2022-08-31T16:15:11.517