langJapanese
HOME > INplc > Known Vulnerabilities in INplc 3.08 Products
[JVN#59624986]
Known Vulnerabilities in
INplc 3.08 Products

Any DLL loading vulnerability in Micronet INplc SDK installer
  • Information published date
2018/9/7
  • Overview
A vulnerability related to DLL reading exists in the INplc SDK Express product installer and the INplc SDK Pro + product installer provided by Micronet Corporation
  • Products subject to vulnerability
INplc SDK Express
INplc-SDK Pro+
Version 3.08 and earlier
  • Detailed information on vulnerability
The INplc SDK Express product and the INplc SDK Pro + product produced by Micronet Corporation has a problem. These installer because it is reading an external DLL then there is a vulnerability that it reads when a malicious DLL of the same name is placed.
  • Possible impact
There is a possibility that arbitrary code may be executed with the authority of running the installer. Please note that this vulnerability only affects installer launched. INplc products already installed are not affected.
  • How to respond
(1) It changed from the shipping product after the information published date to the installer that fixed this vulnerability
(2) Even if you have these product packages, there is no danger if you use the installer on the product CD-ROM because it is un-rewriteable
(3) If you have these product packages, please do not copy the product CD-ROM to other rewriteable media
  • Acknowledgments
Based on the Information Security Early Warning Partnership, the following person reported this vulnerability information to IPA and JPCERT / CC coordinated with developers
Reporter: The University of Tokyo / NEC Corporation Mr. Mitsuo Shiraki
Buffer overflow vulnerability in Micronet INplc
  • Information published date
2018/9/7
  • Overview
There is a buffer overflow vulnerability in INplc-RT products provided by Micronet Corporation
  • Products subject to vulnerability
INplc-RT
Version 3.08 and earlier
  • Detailed information on vulnerability
INplc-RT products provided by Micronet, Corporation have a buffer overflow problem, and there is a vulnerability affected by a malicious transaction
  • Possible impact
By sending a malicious character string by an attacker, there is a possibility that the control equipment etc. will run away
  • How to respond
(1) It changed from the shipping product after the information published date and fixed this vulnerability
(2) It can be avoided by setting UDP port 1221 to not disclose
  • Acknowledgments
Based on the Information Security Early Warning Partnership, the following person reported this vulnerability information to IPA and JPCERT / CC coordinated with developers
Reporter: The University of Tokyo / NEC Corporation Mr. Mitsuo Shiraki
Authentication deficiency and privilege elevation vulnerability in Micronet INplc
  • Information published date
2018/9/7
  • Overview
The INplc-RT product provided by Micronet Corporation has a vulnerability of incomplete authentication. There is also a privilege elevation vulnerability by tampering Windows files by applying this vulnerability
  • Products subject to vulnerability
INplc-RT
Version 3.08 and earlier
  • Detailed information on vulnerability
The INplc-RT product provided by Micronet Corporation has an incomplete authentication problem, and there is a vulnerability affected by an attacker's spoofed request. Also, there is a privilege elevation vulnerability by tampering Windows files by applying this vulnerability
  • Possible impact
Attackers through unauthorized control of control equipment, tampering with ladder programs, malicious files placement through the traffic conforming to the protocol may result in a foothold of illegal invasion
  • How to respond
(1) It changed from the shipping product after the information published date and fixed this vulnerability
(2) It can be avoided by setting UDP port 1221, TCP ports 1222, 29701, 41100 to not disclose
  • Acknowledgments
Based on the Information Security Early Warning Partnership, the following person reported this vulnerability information to IPA and JPCERT / CC coordinated with developers
Reporter: The University of Tokyo / NEC Corporation Mr. Mitsuo Shiraki