Vulnerability Details : CVE-2019-6532
Panasonic FPWIN Pro version 7.3.0.0 and prior allows attacker-created project files to be loaded by an authenticated user triggering incompatible type errors because the resource does not have expected properties. This may lead to remote code execution.
Vulnerability category: Execute code
Products affected by CVE-2019-6532
- cpe:2.3:a:panasonic:control_fpwin_pro:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-6532
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-6532
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2019-6532
-
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.Assigned by:
- ics-cert@hq.dhs.gov (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2019-6532
-
https://www.zerodayinitiative.com/advisories/ZDI-19-570/
ZDI-19-570 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://www.zerodayinitiative.com/advisories/ZDI-19-566/
ZDI-19-566 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/108683
Panasonic Control FPWIN Pro Heap Buffer Overflow and Remote Code Execution VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.zerodayinitiative.com/advisories/ZDI-19-568/
ZDI-19-568 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
https://ics-cert.us-cert.gov/advisories/ICSA-19-157-02
Panasonic Control FPWIN Pro | CISAMailing List;Patch;Third Party Advisory;US Government Resource
Jump to