Zurück zur Übersicht

Endress+Hauser: Multiple Devices affected by fdtContainer vulnerability

VDE-2021-005
Last update
14.05.2025 15:00
Published at
01.03.2021 07:39
Vendor(s)
Endress+Hauser AG
External ID
VDE-2021-005
CSAF Document

Summary

The fdtCONTAINER component is integrated into an application (host application). The fdtCONTAINER application is a specific host application which integrates the fdtCONTAINER component.

The fdtCONTAINER component exchanges binary data blobs with such a host application. Typically, the host application saves these binary data blobs into a project storage (project file or a project database).

To manipulate the data inside the project storage, the attacker needs write access to this project storage. Additionally, the manipulated project needs to be opened by the host application. It depends on the host application whether opening the project requires a user action or not. In
fdtCONTAINER applications, the user has to open the manipulated project file manually.

In the case of opening a stored project, the deserialization of the manipulated data can be exploited.

Impact

The engineering workstation, on which the host application is executed, might execute malicious code with the user rights of the host application.

Affected Product(s)

Model no. Product name Affected versions
SRP700 Asset Health Monitoring (FieldCare SFE500) <=2.15.01 Asset Health Monitoring (FieldCare SFE500) <=2.15.01
SFE100 DeviceCare <=1.07.00 DeviceCare <=1.07.00
SMT50, SMT70, SMT77 Field Xpert <=1.05.00 Field Xpert <=1.05.00
SFE500 FieldCare <=2.15.01 FieldCare <=2.15.01

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Deserialization of Untrusted Data (CWE-502)
Summary

M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.

References

Mitigation

  1. Exchange project data only via secure exchange services
  2. Use appropriate means to protect the project storage from unauthorized manipulation
  3. Do not open project data from an unknown source
  4. Reduce the user rights of the host application to the necessary minimum

Remediation

Planned for future versions

Revision History

Version Date Summary
1 01.03.2021 07:39 Initial revision.
2 14.05.2025 15:00 Fix: added distribution