Show plain JSON{"id": "CVE-2018-17889", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "REQUIRED", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 1.6}]}, "published": "2018-10-08T12:29:00.517", "references": [{"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01", "tags": ["Third Party Advisory", "US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ics-cert@hq.dhs.gov", "description": [{"lang": "en", "value": "CWE-611"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-611"}]}], "descriptions": [{"lang": "en", "value": "In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure."}, {"lang": "es", "value": "En WECON Technology Co., Ltd. PI Studio HMI en versiones 4.1.9 y anteriores y PI Studio en versiones 4.2.34, al analizar archivos de proyecto, el XMLParser que se distribuye con Wecon PIStudio es vulnerable a un ataque de inyecci\u00f3n de entidades externas XML, lo que podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n sensible."}], "lastModified": "2024-11-21T03:55:08.770", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:we-con:pi_studio:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9204D3F4-D3DA-4EA4-A932-950F721DB135", "versionEndIncluding": "4.2.34"}, {"criteria": "cpe:2.3:a:we-con:pi_studio_hmi:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "159E2064-BDBD-4354-A8AC-2894EAA39248", "versionEndIncluding": "4.1.9"}], "operator": "OR"}]}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}