Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read.
{"id": "CVE-2022-3377", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-3377", "description": "Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read.", "published": "2022-11-15T21:15:00", "modified": "2022-11-21T16:21:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3377", "reporter": "ics-cert@hq.dhs.gov", "references": ["https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03"], "cvelist": ["CVE-2022-3377"], "immutableFields": [], "lastseen": "2023-02-09T14:30:30", "viewCount": 23, "enchantments": {"dependencies": {"references": [{"type": "ics", "idList": ["ICSA-22-277-03"]}]}, "score": {"value": 4.9, "vector": "NONE"}, "twitter": {"counter": 6, "tweets": [{"link": "https://twitter.com/WolfgangSesin/status/1592691484091944960", "text": "New post from https://t.co/uXvPWJy6tj (CVE-2022-3377) has been published on https://t.co/4BBJib8JUJ", "author": "WolfgangSesin", "author_photo": "https://pbs.twimg.com/profile_images/957011635369054208/Om3jbj7z_400x400.jpg"}, {"link": "https://twitter.com/www_sesin_at/status/1592691486017159168", "text": "New post from https://t.co/9KYxtdZjkl (CVE-2022-3377) has been published on https://t.co/YBEXVsElVK", "author": "www_sesin_at", "author_photo": "https://pbs.twimg.com/profile_images/958100963822329858/fb_N8h5n_400x400.jpg"}, {"link": "https://twitter.com/WolfgangSesin/status/1594745183257632769", "text": "New post from https://t.co/uXvPWJy6tj (CVE-2022-3377 (cscape)) has been published on https://t.co/XMgfhKxSr2", "author": "WolfgangSesin", "author_photo": "https://pbs.twimg.com/profile_images/957011635369054208/Om3jbj7z_400x400.jpg"}, {"link": "https://twitter.com/www_sesin_at/status/1594745185841324036", "text": "New post from https://t.co/9KYxtdZjkl (CVE-2022-3377 (cscape)) has been published on https://t.co/DdpeG6L5qj", "author": "www_sesin_at", "author_photo": "https://pbs.twimg.com/profile_images/958100963822329858/fb_N8h5n_400x400.jpg"}]}, "affected_software": {"major_version": [{"name": "hornerautomation cscape", "version": 9}]}, "epss": [{"cve": "CVE-2022-3377", "epss": "0.000530000", "percentile": "0.188020000", "modified": "2023-03-20"}], "vulnersScore": 4.9}, "_state": {"dependencies": 1675961342, "score": 1675958347, "twitter": 0, "affected_software_major_version": 1677380494, "epss": 1679352629}, "_internal": {"score_hash": "74f6efdb0a44dcc345e25e5459faa89b"}, "cna_cvss": {"cna": "ICS-CERT", "cvss": {"3": {"vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "score": 7.8}}}, "cpe": ["cpe:/a:hornerautomation:cscape:9.90"], "cpe23": ["cpe:2.3:a:hornerautomation:cscape:9.90:sp6:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp5:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*"], "cwe": ["CWE-824"], "affectedSoftware": [{"cpeName": "hornerautomation:cscape", "version": "9.90", "operator": "eq", "name": "hornerautomation cscape"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:*:*:*:*:*:*:*", "versionEndExcluding": "9.90", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp5:*:*:*:*:*:*", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:hornerautomation:cscape:9.90:sp6:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03", "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-277-03", "refsource": "MISC", "tags": ["Patch", "Third Party Advisory", "US Government Resource"]}], "product_info": [{"vendor": "Horner Automation", "product": "Cscape"}]}
{"ics": [{"lastseen": "2023-03-31T17:06:49", "description": "## 1\\. EXECUTIVE SUMMARY\n\n * **CVSS v3 7.8**\n * **ATTENTION:** Low attack complexity\n * **Vendor:** Horner Automation\n * **Equipment:** Cscape\n * **Vulnerabilities:** Out-of-bounds Write, Access of Uninitialized Pointer\n\n## 2\\. RISK EVALUATION\n\nSuccessful exploitation of these vulnerabilities could allow local attackers to execute arbitrary code.\n\n## 3\\. TECHNICAL DETAILS\n\n### 3.1 AFFECTED PRODUCTS\n\nThe following versions of Cscape, a PLC control software, are affected:\n\n * Cscape Version 9.90 SP 6 and prior\n * Cscape Version 9.90 SP 7 and prior (CVE-2022-3379 and CVE-2022-3378 only)\n\n### 3.2 VULNERABILITY OVERVIEW\n\n#### 3.2.1 [OUT-OF-BOUNDS WRITE CWE-787](<https://cwe.mitre.org/data/definitions/787.html>)\n\nThe affected product does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by writing outside the memory buffer.\n\n[CVE-2022-3379](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3379>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.2 [ACCESS OF UNINITIALIZED POINTER CWE-824](<https://cwe.mitre.org/data/definitions/824.html>)\n\nThe affected product does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory write.\n\n[CVE-2022-3378](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3378>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)).\n\n#### 3.2.3 [ACCESS OF UNINITIALIZED POINTER CWE-824](<https://cwe.mitre.org/data/definitions/824.html>)\n\nThe affected product does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read.\n\n[CVE-2022-3377](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3377>) has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is ([AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H>)).\n\n### 3.3 BACKGROUND\n\n * **CRITICAL INFRASTRUCTURE SECTORS:** Critical Manufacturing\n * **COUNTRIES/AREAS DEPLOYED:** Worldwide\n * **COMPANY HEADQUARTERS LOCATION:** United States\n\n### 3.4 RESEARCHER\n\nMichael Heinzl reported these vulnerabilities to CISA.\n\n## 4\\. MITIGATIONS\n\nHorner Automation recommends affected users update to the latest version of Cscape, [version 9.90 SP8](<https://hornerautomation.com/cscape-software/>). \nFor further assistance, users should contact Horner Automation:\n\n * For North and South American users: techsppt@heapg.com (+1-317-916-4274)\n * For users outside of the Americas: technical.support@horner-apg.com (+353-(0)21-4321266 ext. 202)\n\nCISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\n\nCISA also provides a section for [control systems security recommended practices](<https://us-cert.cisa.gov/ics/Recommended-Practices>) on the ICS webpage at [cisa.gov/ics](<https://cisa.gov/ics>). Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with [Defense-in-Depth Strategies](<https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf>).\n\nAdditional mitigation guidance and recommended practices are publicly available on the ICS webpage at [cisa.gov/ics](<https://cisa.gov/ics>) in the technical information paper, [ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies](<https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B>).\n\nOrganizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.\n\nCISA also recommends users take the following measures to protect themselves from social engineering attacks:\n\n * Do not click web links or open attachments in unsolicited email messages.\n * Refer to [Recognizing and Avoiding Email Scams](<https://www.cisa.gov/uscert/sites/default/files/publications/emailscams_0905.pdf>) for more information on avoiding email scams.\n * Refer to [Avoiding Social Engineering and Phishing Attacks](<https://www.cisa.gov/uscert/ncas/tips/ST04-014>) for more information on social engineering attacks.\n\nNo known public exploits specifically target these vulnerabilities. These vulnerabilities are not exploitable remotely.\n\n### Vendor\n\nHorner Automation\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2022-10-04T12:00:00", "type": "ics", "title": "Horner Automation Cscape", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2022-3377", "CVE-2022-3378", "CVE-2022-3379"], "modified": "2022-10-04T12:00:00", "id": "ICSA-22-277-03", "href": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-277-03", "cvss": {"score": 0.0, "vector": "NONE"}}]}