First published: Mon Sep 23 2019(Updated: )
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Redlion Crimson | <=3.0 | |
Redlion Crimson | >=3.1<3112.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10996 is high, with a severity value of 7.8.
Red Lion Controls Crimson versions 3.0 and prior, and version 3.1 prior to release 3112.00, are affected by CVE-2019-10996.
CVE-2019-10996 can be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.
At the time of writing, no specific fix information is available. It is recommended to follow the guidance provided by Red Lion Controls and stay updated with their security advisories.
You can find more information about CVE-2019-10996 on the official advisory published by the United States Computer Emergency Readiness Team (US-CERT) at https://www.us-cert.gov/ics/advisories/icsa-19-248-01.