Omron has a series of workarounds while it is working on an update to mitigate an untrusted search path vulnerability in its Network Configurator for DeviceNet, according to a report with NCCIC.
Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution under the privileges of the application. The researcher with the handle n0b0dy discovered the vulnerability.
Network Configurator for DeviceNet Safety 3.41 and prior suffer from the issue.
In the vulnerability, the application searches for resources by means of an untrusted search path that could execute a malicious .dll file not under the application’s direct control and outside the intended directories.
CVE-2019-10971 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.3.
The product sees use mainly in the critical manufacturing sector. In addition, it sees action on a global basis.
No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely. However, an attacker with low skill level could leverage the vulnerability.
Japan-based Omron is planning on releasing an update that mitigates the issues in the near future.
In the meantime, Omron recommended applying the following workarounds:
• Remove or restrict directories listed in the PATH environment variable
• Ensure system directories are writable only by administrators, which is Windows’ initial configuration
• Operate Windows PCs with a standard user (non-administrator) account. Administrator accounts should be used only when necessary
• Ensure there are no untrusted files in the directory where the application is installed
• Confirm no untrusted files exist in the same directory before double-clicking project file or copying the project file to a trusted directory or a newly-created temporary directory