First published: Thu Dec 20 2018(Updated: )
Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Horner Automation Cscape | <9.80.75.3 | |
Horner Automation Cscape | =9.80.75.3 | |
Horner Automation Cscape | =9.80.75.3-sp1 | |
Horner Automation Cscape | =9.80.75.3-sp2 | |
Horner Automation Cscape | =9.80.75.3-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-19005 is high with a CVSS score of 7.8.
CVE-2018-19005 can be exploited by processing specially crafted POC files lacking user input validation, which may allow an attacker to read confidential information and remotely execute arbitrary code.
Cscape versions 9.80.75.3 SP3 and prior are affected by CVE-2018-19005.
To fix CVE-2018-19005, it is recommended to update to a version of Cscape that is not affected by this vulnerability or apply the necessary patches provided by the vendor.
You can find more information about CVE-2018-19005 at the following references: [SecurityFocus](http://www.securityfocus.com/bid/106275) and [ICS-CERT](https://ics-cert.us-cert.gov/advisories/ICSA-18-354-01).