First published: Fri Jun 07 2019(Updated: )
Panasonic FPWIN Pro version 7.3.0.0 and prior allows attacker-created project files to be loaded by an authenticated user causing heap-based buffer overflows, which may lead to remote code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Panasonic Control FPWIN Pro | <=7.3.0.0 | |
Panasonic Control FPWIN Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this exploit is CVE-2019-6530.
The title of this vulnerability is 'Panasonic Control FPWIN PRO Project File Parsing ctreestd Heap-based Buffer Overflow Remote Code Execution'.
This vulnerability can be exploited by remote attackers who can execute arbitrary code on vulnerable installations of Panasonic Control FPWin Pro by tricking the victim into visiting a malicious page or opening a malicious file.
The severity of this vulnerability is high with a CVSS score of 7.8.
Yes, you can find more information about this vulnerability at the following references: [Link 1](http://www.securityfocus.com/bid/108683), [Link 2](https://ics-cert.us-cert.gov/advisories/ICSA-19-157-02), [Link 3](https://www.zerodayinitiative.com/advisories/ZDI-19-565/)