{"api_version":"1","generated_at":"2026-04-27T03:37:38+00:00","cve":"CVE-2018-19005","urls":{"html":"https://cve.report/CVE-2018-19005","api":"https://cve.report/api/cve/CVE-2018-19005.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-19005","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-19005"},"summary":{"title":"CVE-2018-19005","description":"Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code.","state":"PUBLIC","assigner":"ics-cert@hq.dhs.gov","published_at":"2018-12-20 21:29:00","updated_at":"2019-10-09 23:37:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01","name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01","refsource":"MISC","tags":["Third Party Advisory","US Government Resource"],"title":"Horner Automation Cscape | ICS-CERT","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/106275","name":"106275","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Horner Automation Cscape CVE-2018-19005 Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-19005","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19005","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"19005","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hornerautomation","cpe5":"cscape","cpe6":"9.80.75.3","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-19005","qid":"590530","title":"Horner Automation Cscape Remote Code Execution Vulnerability (ICSA-18-354-01)"},{"cve":"CVE-2018-19005","qid":"590850","title":"Horner Automation Cscape Remote Code Execution (RCE) Vulnerability (ICSA-18-354-01)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"ics-cert@hq.dhs.gov","ID":"CVE-2018-19005","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cscape","version":{"version_data":[{"version_value":"Cscape Version 9.80.75.3 SP3 and prior."}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"IMPROPER INPUT VALIDATION CWE-20"}]}]},"references":{"reference_data":[{"name":"106275","refsource":"BID","url":"http://www.securityfocus.com/bid/106275"},{"name":"https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01","refsource":"MISC","url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01"}]}},"nvd":{"publishedDate":"2018-12-20 21:29:00","lastModifiedDate":"2019-10-09 23:37:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hornerautomation:cscape:9.80.75.3:sp3:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hornerautomation:cscape:9.80.75.3:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hornerautomation:cscape:9.80.75.3:sp2:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*","versionEndExcluding":"9.80.75.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hornerautomation:cscape:9.80.75.3:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"19005","Ordinal":"135931","Title":"CVE-2018-19005","CVE":"CVE-2018-19005","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"19005","Ordinal":"1","NoteData":"Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"19005","Ordinal":"2","NoteData":"2018-12-20","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"19005","Ordinal":"3","NoteData":"2018-12-21","Type":"Other","Title":"Modified"}]}}}