{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T07:21:28.433","vulnerabilities":[{"cve":{"id":"CVE-2018-17889","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2018-10-08T12:29:00.517","lastModified":"2024-11-21T03:55:08.770","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In WECON Technology Co., Ltd. PI Studio HMI versions 4.1.9 and prior and PI Studio versions 4.2.34 and prior when parsing project files, the XMLParser that ships with Wecon PIStudio is vulnerable to a XML external entity injection attack, which may allow sensitive information disclosure."},{"lang":"es","value":"En WECON Technology Co., Ltd. PI Studio HMI en versiones 4.1.9 y anteriores y PI Studio en versiones 4.2.34, al analizar archivos de proyecto, el XMLParser que se distribuye con Wecon PIStudio es vulnerable a un ataque de inyección de entidades externas XML, lo que podría permitir la divulgación de información sensible."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-611"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-611"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:we-con:pi_studio:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.34","matchCriteriaId":"9204D3F4-D3DA-4EA4-A932-950F721DB135"},{"vulnerable":true,"criteria":"cpe:2.3:a:we-con:pi_studio_hmi:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.9","matchCriteriaId":"159E2064-BDBD-4354-A8AC-2894EAA39248"}]}]}],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-277-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}