SB2018081706 - Multiple vulnerabilities in Emerson DeltaV DCS Workstations



SB2018081706 - Multiple vulnerabilities in Emerson DeltaV DCS Workstations

Published: August 17, 2018

Security Bulletin ID SB2018081706
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Insecure DLL loading (CVE-ID: CVE-2018-14797)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to insecure .dll loading mechanism when opening files. A local attacker can place a file along with specially crafted .dll file on a remote SBM or WebDAV share, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


2) Relative path traversal (CVE-ID: CVE-2018-14795)

The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper path validation. A remote attacker can conduct relative path traversal attack and replace executable files.


3) Improper privilege management (CVE-ID: CVE-2018-14791)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper privilege management. A local attacker can change executable and library files and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


4) Stack-based buffer overflow (CVE-ID: CVE-2018-14793)

The vulnerability allows an adjacent attacker to execute arbitrary code on the target system.

The vulnerability exists due to stack-based buffer overflow. An adjacent attacker can use open communication port to trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Install update from vendor's website.