Risk | High |
Patch available | NO |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2017-9638 CVE-2017-9636 CVE-2017-9634 |
CWE-ID | CWE-121 CWE-122 CWE-787 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
E-Designer Client/Desktop applications / File managers, FTP clients |
Vendor | Mitsubishi Electric |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU7648
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-9638
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code.
The weakness exists due to stack-based buffer overflow in six code sections. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
Mitsubishi recommends the following actions to mitigate these vulnerabilities:
E-Designer: 7.52 Build 344
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-17-213-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7649
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-9636
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code.
The weakness exists due to heap-based buffer overflow in five code sections. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
Mitsubishi recommends the following actions to mitigate these vulnerabilities:
E-Designer: 7.52 Build 344
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-17-213-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU7650
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2017-9634
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code.
The weakness exists due to out-of-bounds write in two code sections. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may result in system compromise.
Mitsubishi recommends the following actions to mitigate these vulnerabilities:
E-Designer: 7.52 Build 344
CPE2.3 External linkshttps://ics-cert.us-cert.gov/advisories/ICSA-17-213-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.