Panasonic created a new version to mitigate buffer overflow vulnerabilities in its FPWIN Pro software, according to a report from ICS-CERT.
The vulnerability report came from Trend Micro’s Zero Day Initiative (ZDI) via security researcher Steven Seeley.
The vulnerabilities affect the following products:
• FPWIN Pro version 5.x
• FPWIN Pro version 6.x
• FPWIN Pro version 7.122 and prior
Software releases 5.x have reached end-of-support, and users should migrate to a supported release. Software releases 6.x are end-of-sales since April 2015 and will reach end-of-support in September this year. Users using 6.x releases should plan for an upgrade to the supported software release.
Reading a malformed project file can crash Panasonic FPWIN Pro application. The vulnerabilities do not have direct impact on the system controlled by Panasonic FPWIN Pro application.
Panasonic Electric Works Europe AG is a Panasonic company developing automation products and industrial solutions.
The affected product, FPWIN Pro, is programming software for all FP Series PLCs.
FPWIN Pro sees action across several sectors including commercial facilities, critical manufacturing, and food and agriculture. Panasonic said these products see use primarily in Europe, North America, and Asia.
There are multiple ways an attacker can overwrite portions of the heap, which may cause the program to crash.
CVE-2016-4499 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.2.
Also, the program accesses a pointer that has not been initialized.
CVE-2016-4498 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.2.
In addition, an attacker can use an index value or an integer overflow to force the program to write outside the bounds of an array.
CVE-2016-4496 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.2.
In one more instance, the program allocates or initializes a resource; such as a pointer, object, or variable; using one type, but it later accesses that resource using a type that is incompatible with the original type.
CVE-2016-4497 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 4.2.
These vulnerabilities are not exploitable remotely and cannot end up leveraged without user interaction. The exploit only triggers when a local user runs the vulnerable application and loads the malformed project file.
No known public exploits specifically target these vulnerabilities.
Crafting a working exploit for these vulnerabilities would be difficult. Social engineering would be mandatory to convince the user to accept the malformed project file. Additional user interaction would end up needed to load the malformed file. This decreases the likelihood of a successful exploit.
Panasonic has released FPWIN Pro 7.130 software that addresses the vulnerabilities described in this advisory.
Panasonic said users may only install, use, and expect support for software versions and feature sets for which they have purchased a license.
For more information about these issues or other vulnerabilities in Panasonic products, click here to contact the Panasonic Product Security Incident Response Team.