First published: Wed Apr 18 2012(Updated: )
The GENESIS32 IcoSetServer ActiveX control in ICONICS GENESIS32 9.21 and BizViz 9.21 configures the trusted zone on the basis of user input, which allows remote attackers to execute arbitrary code via a crafted web site, related to a "Workbench32/WebHMI component SetTrustedZone Policy vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ICONICS GENESIS32 | =9.21 | |
ICONICS BizViz | =9.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5088 is considered a critical vulnerability due to its potential to allow remote code execution.
To address CVE-2011-5088, users should update to the latest version of ICONICS GENESIS32 and BizViz beyond version 9.21.
CVE-2011-5088 is classified as a code execution vulnerability that exploits the configuration of the trusted zone based on user input.
Users of ICONICS GENESIS32 9.21 and BizViz 9.21 are affected by CVE-2011-5088.
Yes, CVE-2011-5088 can be exploited remotely through crafted websites that manipulate the trusted zone.