PHOENIX CONTACT Multiple Vulnerabilities in MEVIEW3

VDE-2019-003 (2019-03-05 12:35 UTC+0200)

Affected Vendors

PHOENIX CONTACT

Affected Products

MEVIEW3 < v3.14.25
MEVIEW3 < v3.15.18

Vulnerability Type

Buffer Errors (CWE-119)

Summary

Multiple vulnerabilities for MEVIEW3 have been identified in PHOENIX CONTACT MEVIEW3, versions below 3.14.25 and 3.15.18

Impact

(sorted by severity, values taken from nvd.nist.gov)

CVE-ID: CVE-2018-3991
CVSS Score: 9.8 (CVSS:3.0:AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Vulnerability Type:
Buffer Errors (CWE-119)

Description
An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.

Impact
WIBU-SYSTEMS WibuKey network server management remote code execution vulnerability
The vulnerability affects all operating systems and allows the potential execution of code on network accessible WibuKey network servers. Only the systems on which a WibuKey network server is running are affected. This applies to systems that provide licenses for an attached WibuBox in the network for use by other clients.

CVE-ID: CVE-2018-3990
CVSS Score: 7.8 (CVSS:3.0:AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)
Vulnerability Type: Buffer Errors (CWE-119)

Description
An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.

Impact
WIBU-SYSTEMS WibuKey.sys pool has a corruption privilege escalation vulnerability.
The vulnerability affects Windows systems and allows potential unauthorized privilege escalation on the local system.

CVE-ID: CVE-2018-3989
CVSS Score: 5.5 (CVSS:3.0:AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Vulnerability Type: Information Leak / Disclosure (CWE-200)

Description
An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.

Impact
WIBU-SYSTEMS WibuKey.sys has a kernel memory information disclosure vulnerability.
The vulnerability affects Windows systems and allows unauthorized reading of kernel memory information on the local system.

Solution

WibuKey Runtime Version 6.50 will be integrated in the next version MEVIEW3 (3.14.25 & 3.15.18).

Mitigation

a) Dongle based licensing
Update WibuKey Runtime to version 6.50. See: https://www.wibu.com/support/user/downloads-user-software.html

b) Hardwarecode-based licensing
Removing the WibuKey application.
For further information please refer to:
https://www.wibu.com/de/support/anwendersoftware/anwendersoftware/file/download/5638.html

Reported by

PHOENIX CONTACT Energy Automation GmbH was informed about this vulnerabilities by WIBU-SYSTEMS AG.