Show plain JSON{"id": "CVE-2018-10628", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2018-07-24T18:29:00.233", "references": [{"url": "http://www.securityfocus.com/bid/104864", "tags": ["Broken Link"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-02", "tags": ["Patch", "Permissions Required", "Third Party Advisory", "US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec127%28003%29.pdf", "source": "ics-cert@hq.dhs.gov"}, {"url": "http://www.securityfocus.com/bid/104864", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-200-02", "tags": ["Patch", "Permissions Required", "Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec127%28003%29.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ics-cert@hq.dhs.gov", "description": [{"lang": "en", "value": "CWE-121"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process."}, {"lang": "es", "value": "AVEVA InTouch 2014 R2 SP1 y anteriores, InTouch 2017, InTouch 2017 Update 1 e InTouch 2017 Update 2 permiten que un usuario no autenticado env\u00ede un paquete especialmente manipulado que podr\u00eda sobrescribir el b\u00fafer en un locale que no emplea un separador de punto flotante. Su explotaci\u00f3n podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo bajo los privilegios del proceso InTouch View."}], "lastModified": "2024-11-21T03:41:41.730", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:aveva:intouch_2014:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "072D8283-DF3E-4CE3-A9A2-81E8CF8A9DC0"}, {"criteria": "cpe:2.3:a:aveva:intouch_2014:r2:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C3D1BF4-FA24-4A5E-939D-9F66FD30F380"}, {"criteria": "cpe:2.3:a:aveva:intouch_2017:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F296574-D8BA-4159-9C0F-36FC9C0A8BE6"}, {"criteria": "cpe:2.3:a:aveva:intouch_2017:-:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D5EFF01-07DD-4711-8DB6-0534769FD034"}, {"criteria": "cpe:2.3:a:aveva:intouch_2017:-:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB06E770-CE7C-44F7-A2CC-75E6409BC300"}], "operator": "OR"}]}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}