Fuji Electric is in the process of working on a resolution to fix a classic buffer overflow and a heap-based buffer overflow in its Alpha5 Smart Loader, according to a report with NCCIC.
Successful exploitation of these vulnerabilities, discovered by Michael Flanders working with Trend Micro’s Zero Day Initiative, could allow for arbitrary remote code execution on the device. Public exploits are available.
A servo drive, Alpha5 Smart Loader Versions 3.7 and prior suffer from the remotely exploitable vulnerabilities.
In one vulnerability, a buffer overflow information disclosure vulnerability occurs when parsing certain file types.
CVE-2018-14788 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 5.3.
In the other issue, the device does not perform a check on the length/size of a project file before copying the entire contents of the file to a heap-based buffer.
CVE-2018-14794 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.
The product sees use mainly in the commercial facilities and critical manufacturing sectors. It also sees action mainly in Europe and Asia.
An attacker with low skill level could leverage the vulnerabilities.
Japan-based Fuji Electric said they are working on a resolution to the reported vulnerabilities.