First published: Tue Apr 17 2018(Updated: )
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron Cx-flnet | <=1.00 | |
Omron CX-One | <=4.42 | |
Omron CX-Programmer | <=9.65 | |
Omron Cx-protocol | <=1.992 | |
Omron Cx-server | <=5.0.22 | |
Omron Network Configurator | <=3.63 | |
Omron Switch Box Utility | <=1.68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7530 is a vulnerability that allows an attacker to parse malformed project files in Omron CX-One versions 4.42 and prior, including various applications such as CX-FLnet, CX-Protocol, CX-Programmer, CX-Server, Network Configurator, and Switch Box Utility.
The severity of CVE-2018-7530 is high with a CVSS score of 7.8.
Omron CX-One versions 4.42 and prior, including CX-FLnet 1.00 and prior, CX-Protocol 1.992 and prior, CX-Programmer 9.65 and prior, CX-Server 5.0.22 and prior, Network Configurator 3.63 and prior, and Switch Box Utility 1.68.
An attacker can exploit CVE-2018-7530 by crafting and delivering a malicious project file to a vulnerable Omron CX-One application, which upon parsing the file can lead to arbitrary code execution or denial of service.
It is recommended to update to the latest version of Omron CX-One and its associated applications to mitigate the vulnerability. Additionally, implementing strong access controls and network segmentation can help reduce the risk of a successful attack.