{"api_version":"1","generated_at":"2026-05-13T11:00:46+00:00","cve":"CVE-2018-14810","urls":{"html":"https://cve.report/CVE-2018-14810","api":"https://cve.report/api/cve/CVE-2018-14810.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-14810","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-14810"},"summary":{"title":"CVE-2018-14810","description":"WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior parse files and pass invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2018-10-08 12:29:00","updated_at":"2019-10-09 23:35:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"WECON PI Studio | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-14810","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14810","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"14810","vulnerable":"1","versionEndIncluding":"4.2.34","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"we-con","cpe5":"pi_studio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"14810","vulnerable":"1","versionEndIncluding":"4.1.9","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"we-con","cpe5":"pi_studio_hmi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2018-10-04T00:00:00","ID":"CVE-2018-14810","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PI Studio HMI","version":{"version_data":[{"version_value":"4.1.9 and prior"}]}},{"product_name":"PI Studio","version":{"version_data":[{"version_value":"4.2.34 and prior"}]}}]},"vendor_name":"WECON"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior parse files and pass invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OUT-OF-BOUNDS WRITE CWE-787"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01"}]}},"nvd":{"publishedDate":"2018-10-08 12:29:00","lastModifiedDate":"2019-10-09 23:35:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:we-con:pi_studio:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.34","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:we-con:pi_studio_hmi:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"14810","Ordinal":"131543","Title":"CVE-2018-14810","CVE":"CVE-2018-14810","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"14810","Ordinal":"1","NoteData":"WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior parse files and pass invalidated user data to an unsafe method call, which may allow code to be executed in the context of an administrator.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"14810","Ordinal":"2","NoteData":"2018-10-08","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"14810","Ordinal":"3","NoteData":"2018-10-08","Type":"Other","Title":"Modified"}]}}}