JVNVU#96242582
Multiple vulnerabilities in IDEC Operator Interfaces products
Overview
IDEC Operator Interfaces products contain multiple vulnerabilities which are due to Zuken Elmic TCP/IP protocol stack.
Products Affected
- HG5G/4G/3G/2G-V Series Operator Interfaces Ver.4.85 and earlier
- HG4G/3G Series Operator Interfaces Ver.4.85 and earlier
- HG2G-5F Series Operator Interfaces Ver.4.85 and earlier
- HG2G-5T Series Operator Interfaces Ver.4.85 and earlier
- HG1G Series Operator Interfaces Ver.4.85 and earlier
- HG1P Series Operator Interfaces Ver.4.85 and earlier
Description
IDEC Operator Interfaces products use Zuken Elmic TCP/IP protocol stack, therefore are affected by multiple vulnerabilities listed below which are known as "URGENT/11" and "Ripple20".
Impact
An attacker may execute arbitrary code, obtain information, and/or cause a denial of service (DoS) condition.
Solution
Update the System Software
Update the System Software to the latest version according to the information provided by the developer.
The developer has released the following versions that address these vulnerabilities.
- HG5G/4G/3G/2G-V Series Operator Interfaces Ver.4.86 and later
- HG4G/3G Series Operator Interfaces Ver.4.86 and later
- HG2G-5F Series Operator Interfaces Ver.4.86 and later
- HG2G-5T Series Operator Interfaces Ver.4.86 and later
- HG1G Series Operator Interfaces Ver.4.86 and later
- HG1P Series Operator Interfaces Ver.4.86 and later
Vendor Status
Vendor | Link |
IDEC Corporation | Multiple Vulnerabilities in Operator Interfaces (PDF) |
References
-
Japan Vulnerability Notes JVNVU#94736763
Multiple vulnerabilities in Treck IP protocol stack (Text in Japanese) -
Wind River Systems, Inc.
SECURITY VULNERABILITY RESPONSE INFORMATION TCP/IP Network Stack (IPnet, Urgent/11) -
JSOF
Ripple20 -
ICS Advisory | ICSA-20-168-01
Treck TCP/IP Stack -
ICS Advisory | ICSA-19-274-01
Interpeak IPnet TCP/IP Stack
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
IDEC Corporation reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
Update History
- 2024/09/20
- Information under the section [References] was updated.
- 2024/09/25
- Information under the section [References] was updated.