First published: Thu Jul 19 2018(Updated: )
AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
AVEVA InTouch 2014 | =r2 | |
AVEVA InTouch 2014 | =r2-sp1 | |
Aveva Intouch 2017 | ||
Aveva Intouch 2017 | =update_1 | |
Aveva Intouch 2017 | =update_2 |
https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec127(003).pdf
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10628 is a vulnerability in AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 that allows an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator, leading to remote code execution.
CVE-2018-10628 is categorized as critical with a severity score of 9.8.
An unauthenticated user can exploit CVE-2018-10628 by sending a specially crafted packet that overflows the buffer on a locale not using a dot floating point separator, potentially allowing for remote code execution.
CVE-2018-10628 affects AVEVA InTouch 2014 R2, InTouch 2014 R2 SP1, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2.
To fix CVE-2018-10628, it is recommended to apply the necessary patches or updates provided by AVEVA to the affected software versions.