CWE-623
Unsafe ActiveX Control Marked Safe For Scripting
An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.
CVE-2018-17925 (GCVE-0-2018-17925)
Vulnerability from cvelistv5
Published
2018-10-10 17:00
Modified
2024-09-16 23:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-623 - Unsafe ActiveX Control Marked Safe For Scripting
Summary
Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:01:14.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105540" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-282-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iFix", "vendor": "GE", "versions": [ { "status": "affected", "version": "2.0 - 5.0" }, { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "5.5" }, { "status": "affected", "version": "5.8" } ] } ], "datePublic": "2018-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-623", "description": "Unsafe ActiveX Control Marked Safe For Scripting CWE-623", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T09:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "105540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105540" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-282-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-10-09T00:00:00", "ID": "CVE-2018-17925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iFix", "version": { "version_data": [ { "version_value": "2.0 - 5.0" }, { "version_value": "5.1" }, { "version_value": "5.5" }, { "version_value": "5.8" } ] } } ] }, "vendor_name": "GE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unsafe ActiveX Control Marked Safe For Scripting CWE-623" } ] } ] }, "references": { "reference_data": [ { "name": "105540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105540" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-282-01", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-282-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-17925", "datePublished": "2018-10-10T17:00:00Z", "dateReserved": "2018-10-02T00:00:00", "dateUpdated": "2024-09-16T23:25:32.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- During development, do not mark it as safe for scripting.
Mitigation
Phase: System Configuration
Description:
- After distribution, you can set the kill bit for the control so that it is not accessible from Internet Explorer.
No CAPEC attack patterns related to this CWE.