First published: Mon Feb 13 2017(Updated: )
An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Connexium Firmware | ||
Schneider-electric Tcsefec2cf3f20 | ||
Schneider Electric TCSEFEC23F3F21 | ||
Schneider-electric Tcsefec2cf3f20 | ||
Schneider Electric TCSEFEC23FCF21 | ||
Schneider Electric TCSEFEC2CF3F20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8352 has a critical severity due to the potential for a stack-based buffer overflow that can be exploited.
To fix CVE-2016-8352, you should update the affected Schneider Electric ConneXium firewall firmware to a version that resolves the vulnerability.
CVE-2016-8352 affects all versions of Schneider Electric ConneXium firewalls TCSEFEC23F3F20, TCSEFEC23F3F21, TCSEFEC23FCF20, TCSEFEC23FCF21, and TCSEFEC2CF3F20.
CVE-2016-8352 is classified as a stack-based buffer overflow vulnerability.
The impact of CVE-2016-8352 can allow an attacker to execute arbitrary code on the affected devices during SNMP login authentication.