Published:2019/03/27  Last Updated:2019/03/27
      
        JVN#63981842
        PowerAct Pro Master Agent for Windows fails to restrict acess permissions
              
      
      Overview
PowerAct Pro Master Agent for Windows fails to restrict access permissions.
Products Affected
PowerAct Pro Master Agent for Windows Version 5.13 and earlier
Description
PowerAct Pro Master Agent for Windows provided by OMRON SOCIAL SOLUTIONS Co.,Ltd. fails to restrict access permissions.
Impact
A user with an Windows general user acccount may alter or edit a file which the user does not have a permission to access.
Solution
Update the Software
Update the software to the latest version and then execute the update tool which addressed the vulnerability according to the information provided by the developer.
Vendor Status
| Vendor | Link | 
| OMRON SOCIAL SOLUTIONS Co.,Ltd. | Notification (Japanese sites) | 
| Download (Japanese sites) | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
              CVSS v3
              CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
              
                
            
            
                  Base Score:
                  3.3
                
                
              | Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) | 
|---|---|---|---|---|
| Attack Complexity(AC) | High (H) | Low (L) | ||
| Privileges Required(PR) | High (H) | Low (L) | None (N) | |
| User Interaction(UI) | Required (R) | None (N) | ||
| Scope(S) | Unchanged (U) | Changed (C) | ||
| Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
| Integrity Impact(I) | None (N) | Low (L) | High (H) | |
| Availability Impact(A) | None (N) | Low (L) | High (H) | 
                CVSS v2
                AV:L/AC:L/Au:S/C:N/I:P/A:N
                
                  
              
              
                    Base Score:
                    1.7
                  
                  
                | Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) | 
|---|---|---|---|
| Access Complexity(AC) | High (H) | Medium (M) | Low (L) | 
| Authentication(Au) | Multiple (M) | Single (S) | None (N) | 
| Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) | 
| Integrity Impact(I) | None (N) | Partial (P) | Complete (C) | 
| Availability Impact(A) | None (N) | Partial (P) | Complete (C) | 
Credit
Hosono, Akane reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert |  | 
| JPCERT Reports |  | 
| CERT Advisory |  | 
| CPNI Advisory |  | 
| TRnotes |  | 
| CVE | CVE-2018-16207 | 
| JVN iPedia | JVNDB-2019-000020 | 
