Omron now has a fix available to mitigate an untrusted search path vulnerability in its Network Configurator for DeviceNet, according to a report with CISA.
When originally revealed back in May, Omron had a series of workarounds, but the company now has an update.
Successful exploitation of this vulnerability, discovered by a researcher with the handle n0b0dy, could allow an attacker to achieve arbitrary code execution under the privileges of the application. Network Configurator for DeviceNet Safety 3.41 and prior suffer from the issue.
The application searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application’s direct control and outside the intended directories.
CVE-2019-10971 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.3.
The product sees use mainly in the critical manufacturing sector and it does see action on a global basis.
No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely.
Omron released Version 3.42 of Network Configurator for DeviceNet Safety to address the vulnerability. Click here to download the latest version of Network Configurator for DeviceNet Safety.
Omron has recommended applying the following for further mitigation:
• Remove or restrict directories listed in the PATH environment variable
• Ensure system directories are writable only by administrators, which is Windows’ initial configuration
• Operate Windows PCs with a standard user (non-administrator) account. Administrator accounts should be used only when necessary
• Ensure there are no untrusted files in the directory where the application is installed
• Confirm no untrusted files exist in the same directory before double-clicking project file or copying the project file to a trusted directory or a newly-created temporary directory