{"api_version":"1","generated_at":"2026-05-13T11:00:46+00:00","cve":"CVE-2018-17889","urls":{"html":"https://cve.report/CVE-2018-17889","api":"https://cve.report/api/cve/CVE-2018-17889.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-17889","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-17889"},"summary":{"title":"CVE-2018-17889","description":"In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2018-10-08 12:29:00","updated_at":"2019-10-09 23:36:00"},"problem_types":["CWE-611"],"metrics":[],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"WECON PI Studio | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-17889","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-17889","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"17889","vulnerable":"1","versionEndIncluding":"4.2.34","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"we-con","cpe5":"pi_studio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"17889","vulnerable":"1","versionEndIncluding":"4.1.9","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"we-con","cpe5":"pi_studio_hmi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","DATE_PUBLIC":"2018-10-04T00:00:00","ID":"CVE-2018-17889","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PI Studio HMI","version":{"version_data":[{"version_value":"4.1.9 and prior"}]}},{"product_name":"PI Studio","version":{"version_data":[{"version_value":"4.2.34 and prior"}]}}]},"vendor_name":"WECON"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"INFORMATION EXPOSURE THROUGH XML EXTERNAL ENTITY REFERENCE CWE-611"}]}]},"references":{"reference_data":[{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01"}]}},"nvd":{"publishedDate":"2018-10-08 12:29:00","lastModifiedDate":"2019-10-09 23:36:00","problem_types":["CWE-611"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.6,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:we-con:pi_studio:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.34","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:we-con:pi_studio_hmi:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"17889","Ordinal":"134706","Title":"CVE-2018-17889","CVE":"CVE-2018-17889","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"17889","Ordinal":"1","NoteData":"In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"17889","Ordinal":"2","NoteData":"2018-10-08","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"17889","Ordinal":"3","NoteData":"2018-10-08","Type":"Other","Title":"Modified"}]}}}