Multiple vulnerabilites in libexpat affecting PRC7000
BOSCH-SA-200802
Advisory Information
- Advisory ID: BOSCH-SA-200802
- CVE Numbers and CVSS v3.1 Scores:
- CVE-2024-45490
- Base Score: 9.8 (Critical)
- CVE-2024-45491
- Base Score: 9.8 (Critical)
- CVE-2024-45492
- Base Score: 9.8 (Critical)
- CVE-2024-45490
- Published: 02 Oct 2024
- Last Updated: 02 Oct 2024
Summary
Multiple vulnerabilities were discovered in the open source library "libexpat", affecting the XML parser functionality. These vulnerabilities allow for integer overflows and invalid negative values for buffer sizes. As this may affect the "Import" and "Restore" functionality - which use libexpat to parse XML files - of the device, updating the firmware is strongly advised.
Affected Products
- Bosch Rexroth AG PRC7000
- CVE-2024-45490, CVE-2024-45491, CVE-2024-45492
- Version(s): all 1.10.0.x - 1.10.5.x
- Version(s): all 1.11.0.x - 1.11.11.x
- Version(s): 1.11.12.0 <= 1.11.12.5
- Version(s): 1.11.13.0 <= 1.11.13.3
- Version(s): 1.11.14.0 <= 1.11.14.1
- CVE-2024-45490, CVE-2024-45491, CVE-2024-45492
Solution and Mitigations
Solution
Update the PRC7000 firmware to one of the following versions. Please note that versions older than 1.11.12.x will not be fixed, affected devices should be updated to 1.11.12.6 at least.
-
Version 1.11.12.6
-
Version 1.11.13.4
-
Version 1.11.14.2
Mitigation
The issue can only be mitigated by employing strict restrictions on both physical access and (remote) network access to the device, preventing possibly malicious actors to access the device.
Vulnerability Details
CVE-2024-45490
CVE description: An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Base Score: 9.8 (Critical)
CVE-2024-45491
CVE description: An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Base Score: 9.8 (Critical)
CVE-2024-45492
CVE description: An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
- Problem Type:
- CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Base Score: 9.8 (Critical)
Remarks
Security Update Information
With respect to Directive (EU) 2019/770 and Directive (EU) 2019/771 and their national transposition laws, please note:
It is your responsibility to download and/or install any security updates provided by us, for example to maintain product or data security. If you fail to install a security update provided to you within a reasonable period of time, we will not be liable for any product defect solely due to the absence of such security update.
Alternatively, we are entitled to directly download and/or install security updates regardless of your settings. In these cases, we will provide you with the relevant information, e.g. in this security advisory.
CVSS Scoring
Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.
Additional Resources
- [1] Bosch Rexroth Advisory: https://www.boschrexroth.com/en/dc/product-security/security-advisories/
Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .
Revision History
- 02 Oct 2024: Initial Publication