CVE-2018-17930

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Teledyne DALSA Sherlock vision software allows remote attackers to execute arbitrary code on affected systems. This affects Sherlock versions 7.2.7.4 and earlier, potentially compromising industrial control systems and manufacturing environments.

💻 Affected Systems

Products:
  • Teledyne DALSA Sherlock
Versions: Version 7.2.7.4 and prior
Operating Systems: Windows (typically used with industrial systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Used in industrial vision inspection systems, often in manufacturing environments with critical processes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full system control, installs malware, disrupts industrial processes, and pivots to other network systems.

🟠

Likely Case

Remote code execution leading to system compromise, data theft, and disruption of vision inspection systems in manufacturing environments.

🟢

If Mitigated

Limited impact if system is isolated, patched, or protected by network segmentation and application whitelisting.

🌐 Internet-Facing: HIGH - CVSS 9.8 indicates critical remote exploitability without authentication.
🏢 Internal Only: HIGH - Even internally, this allows lateral movement and system compromise within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities typically have low exploitation complexity once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 7.2.7.5 or later

Vendor Advisory: https://www.teledynedalsa.com/en/products/imaging/vision-software/sherlock/

Restart Required: Yes

Instructions:

1. Download latest Sherlock version from Teledyne DALSA. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart system. 5. Verify version is 7.2.7.5 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Sherlock systems from untrusted networks and internet access

Application Whitelisting

windows

Implement application control to prevent unauthorized code execution

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Sherlock systems
  • Deploy intrusion detection/prevention systems to monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check Sherlock version in application interface or installation directory

Check Version:

Check Help > About in Sherlock application or review installation properties

Verify Fix Applied:

Confirm version is 7.2.7.5 or higher in application interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Sherlock executable
  • Memory access violations
  • Network connections to unexpected destinations

Network Indicators:

  • Unusual traffic patterns to/from Sherlock systems
  • Exploit attempt signatures in network traffic

SIEM Query:

source="sherlock*" AND (event_type="process_creation" OR event_type="access_violation")

🔗 References

📤 Share & Export