First published: Thu Jun 05 2014(Updated: )
COPA-DATA zenon DNP3 NG driver (DNP3 master) 7.10 and 7.11 through 7.11 SP0 build 10238 and zenon DNP3 Process Gateway (DNP3 outstation) 7.11 SP0 build 10238 and earlier allow physically proximate attackers to cause a denial of service (infinite loop and process crash) via crafted input over a serial line.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Copadata Zenon | =7.10 | |
Copadata Zenon | =7.11 | |
Copadata Zenon | =7.11-sp0_build_10238 | |
Copadata Zenon | =7.11-sp0_build_10238 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2346 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2014-2346, users should update to the latest version of the zenon DNP3 NG driver or DNP3 Process Gateway provided by COPA-DATA.
CVE-2014-2346 allows physically proximate attackers to cause a denial of service via crafted input.
CVE-2014-2346 affects zenon DNP3 NG driver versions 7.10 and 7.11, along with DNP3 Process Gateway version 7.11 SP0 build 10238 and earlier.
The impact of CVE-2014-2346 is that it can lead to an infinite loop and process crash, significantly affecting system performance.