First published: Thu Mar 16 2017(Updated: )
An issue was discovered in Fatek Automation PLC Ethernet Module. The affected Ether_cfg software configuration tool runs on the following Fatek PLCs: CBEH versions prior to V3.6 Build 170215, CBE versions prior to V3.6 Build 170215, CM55E versions prior to V3.6 Build 170215, and CM25E versions prior to V3.6 Build 170215. A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution or crash the affected device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fatek Ethernet Module Configuration Tool Cbe Firmware | <=3.5 | |
Fatek Ethernet Module Configuration Tool Cbeh Firmware | <=3.5 | |
Fatek Ethernet Module Configuration Tool Cm25e Firmware | <=3.5 | |
Fatek Ethernet Module Configuration Tool Cm55e Firmware | <=3.5 | |
Fatek Plc Ethernet Module |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6023 has a medium severity rating due to potential unauthorized access to the affected systems.
To fix CVE-2017-6023, update the Ether_cfg software configuration tool to versions 3.6 Build 170215 or later.
CVE-2017-6023 affects Fatek PLCs running CBEH, CBE, CM55E, and CM25E versions prior to V3.6 Build 170215.
The impact of CVE-2017-6023 could allow attackers to gain unauthorized access and potentially execute harmful commands.
Currently, the recommended approach to mitigate CVE-2017-6023 is to update the affected software, as there are no specified workarounds.