AUVESY Versiondog is an automated production data and change management software solution from the German company AUVESY. A buffer overflow vulnerability exists in AUVESY Versiondog, which can be exploited by attackers to cause a stack overflow.
{"prion": [{"lastseen": "2023-08-16T06:48:53", "description": "The affected product\u2019s code base doesn\u2019t properly control arguments for specific functions, which could lead to a stack overflow.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-22T12:15:00", "type": "prion", "title": "AUVESY Versiondog ", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-38473"], "modified": "2022-04-25T18:02:00", "id": "PRION:CVE-2021-38473", "href": "https://kb.prio-n.com/vulnerability/CVE-2021-38473", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2023-05-23T15:38:44", "description": "The affected product\u2019s code base doesn\u2019t properly control arguments for specific functions, which could lead to a stack overflow.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-22T12:15:00", "type": "cve", "title": "CVE-2021-38473", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-38473"], "modified": "2022-04-25T18:02:00", "cpe": [], "id": "CVE-2021-38473", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38473", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": []}], "ics": [{"lastseen": "2023-09-09T23:15:12", "description": "## 1\\. EXECUTIVE SUMMARY\n\n * **CVSS v3 9.8**\n * **ATTENTION:** Exploitable remotely/low attack complexity\n * **Vendor: **AUVESY\n * **Equipment: **Versiondog\n * **Vulnerabilities:** Improper Access Control, Incorrect Permission Assignment for Critical Resource, Use of Hard-coded Cryptographic Key, Out-of-bounds Read, Use After Free, Out-of-bounds Write, Write-what-where Condition, Use of Potentially Dangerous Function, Unrestricted Upload of File with Dangerous Type, External Control of File Name or Path, External Control of System or Configuration Setting, Improper Input Validation, Uncontrolled Resource Consumption, Uncontrolled Search Path Element, Authentication Bypass by Capture-replay, SQL Injection, Uncontrolled Resource Consumption\n\n## 2\\. RISK EVALUATION\n\nSuccessful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine.\n\n## 3\\. TECHNICAL DETAILS\n\n### 3.1 AFFECTED PRODUCTS\n\nThe following versions of Versiondog, a data management software for automated production, are affected:\n\n * Versiondog: All versions prior to v8.0\n\n### 3.2 VULNERABILITY OVERVIEW\n\n#### 3.2.1 [IMPROPER ACCESS CONTROL CWE-284](<https://cwe.mitre.org/data/definitions/284.html>)\n\nThe server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.\n\n[CVE-2021-38457](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38457>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.2 [INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732](<https://cwe.mitre.org/data/definitions/732.html>)\n\nThe database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.\n\n[CVE-2021-38475](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38475>) has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N>)).\n\n#### 3.2.3 [USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321](<https://cwe.mitre.org/data/definitions/321.html>)\n\nThe affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.\n\n[CVE-2021-38461](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38461>) has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N>)).\n\n#### 3.2.4 [OUT-OF-BOUNDS READ CWE-125](<https://cwe.mitre.org/data/definitions/125.html>)\n\nThe affected product\u2019s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.\n\n[CVE-2021-38451](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38451>) has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been assigned; the CVSS vector string is ([AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N>)).\n\n#### 3.2.5 [USE AFTER FREE CWE-416](<https://cwe.mitre.org/data/definitions/416.html>)\n\nA specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.\n\n[CVE-2021-38467](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38467>) has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.6 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nMany API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.\n\n[CVE-2021-38479](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38479>) has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N>)).\n\n#### 3.2.7 [WRITE-WHAT-WHERE CONDITION CWE-123](<https://cwe.mitre.org/data/definitions/123.html>)\n\nSome API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.\n\n[CVE-2021-38449](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38449>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.8 [IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119](<https://cwe.mitre.org/data/definitions/119.html>)\n\nThe affected product\u2019s code base doesn\u2019t properly control arguments for specific functions, which could lead to a stack overflow.\n\n[CVE-2021-38473](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38473>) has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.9 [UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434](<https://cwe.mitre.org/data/definitions/434.html>)\n\nThere are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.\n\n[CVE-2021-38471](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38471>) has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.10 [EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73](<https://cwe.mitre.org/data/definitions/73.html>)\n\nThere are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.\n\n[CVE-2021-38477](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38477>) has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.11 [EXTERNAL CONTROL OF SYSTEM OR CONFIGURATION SETTING CWE-15](<https://cwe.mitre.org/data/definitions/15.html>)\n\nSome API functions allow interaction with the registry, which includes reading values as well as data modification.\n\n[CVE-2021-38453](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38453>) has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.12 [IMPROPER INPUT VALIDATION CWE-20](<https://cwe.mitre.org/data/definitions/20.html>)\n\nThe affected product\u2019s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.\n\n[CVE-2021-38455](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38455>) has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.13 [UNCONTROLLED RESOURCE CONSUMPTION CWE-400](<https://cwe.mitre.org/data/definitions/400.html>)\n\nThe affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.\n\n[CVE-2021-38463](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38463>) has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.14 [UNCONTROLLED SEARCH PATH ELEMENT CWE-427](<https://cwe.mitre.org/data/definitions/427.html>)\n\nMany of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product\u2019s binaries, thus hijacking the loaded DLL.\n\n[CVE-2021-38469](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38469>) has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.15 [AUTHENTICATION BYPASS BY CAPTURE-REPLAY CWE-294](<https://cwe.mitre.org/data/definitions/294.html>)\n\nThe data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.\n\n[CVE-2021-38459](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38459>) has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is ([AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.16 [SQL INJECTION CWE-89](<https://cwe.mitre.org/data/definitions/89.html>)\n\nThe scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.\n\n[CVE-2021-38481](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38481>) has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H>)).\n\n#### 3.2.17 [UNCONTROLLED RESOURCE CONSUMPTION CWE-400](<https://cwe.mitre.org/data/definitions/400.html>)\n\nThe webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of the webinstaller executable.\n\n[CVE-2021-38465](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38465>) has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been assigned; the CVSS vector string is ([AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H>)).\n\n### 3.3 BACKGROUND\n\n * **CRITICAL INFRASTRUCTURE SECTORS: **Multiple\n * **COUNTRIES/AREAS DEPLOYED: **Worldwide\n * **COMPANY HEADQUARTERS LOCATION: **Germany\n\n### 3.4 RESEARCHER\n\nAmir Preminger of Claroty reported these vulnerabilities to CISA.\n\n## 4\\. MITIGATIONS\n\nAUVESY recommends upgrading Versiondog to [Version 8.1 or later](<https://www.my.versiondog.com/home-en.html>) (login required).\n\nCISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:\n\n * Minimize network exposure for all control system devices and/or systems, and ensure that they are [not accessible from the Internet](<https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01>).\n * Locate control system networks and remote devices behind firewalls, and isolate them from the business network.\n * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.\n\nCISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\n\nCISA also provides a section for [control systems security recommended practices](<https://us-cert.cisa.gov/ics/recommended-practices>) on the ICS webpage on [us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>). Several recommended practices are available for reading and download, including [Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies](<https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf>).\n\nAdditional mitigation guidance and recommended practices are publicly available on the [ICS webpage on us-cert.cisa.gov](<https://us-cert.cisa.gov/ics>) in the Technical Information Paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B>).\n\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.\n\nNo known public exploits specifically target these vulnerabilities.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-10-21T12:00:00", "type": "ics", "title": "AUVESY Versiondog", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.0, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-38449", "CVE-2021-38451", "CVE-2021-38453", "CVE-2021-38455", "CVE-2021-38457", "CVE-2021-38459", "CVE-2021-38461", "CVE-2021-38463", "CVE-2021-38465", "CVE-2021-38467", "CVE-2021-38469", "CVE-2021-38471", "CVE-2021-38473", "CVE-2021-38475", "CVE-2021-38477", "CVE-2021-38479", "CVE-2021-38481"], "modified": "2021-10-21T12:00:00", "id": "ICSA-21-292-01", "href": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-292-01", "cvss": {"score": 9.0, "vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C"}}]}