First published: Fri Mar 01 2019(Updated: )
UltraVNC revision 1203 has out-of-bounds access vulnerability in VNC client inside RAW decoder, which can potentially result code execution. This attack appear to be exploitable via network connectivity. This vulnerability has been fixed in revision 1204.
Credit: vulnerability@kaspersky.com vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
UltraVNC | <1.2.2.3 | |
Siemens SINAMICS GH150 | ||
Siemens SINAMICS GL150 Firmware | ||
Siemens SINAMICS GM150 (with option X30) | ||
Siemens SINAMICS SH150 firmware | ||
Siemens SINAMICS SL150 | ||
Siemens SINAMICS SM120 | ||
Siemens SINAMICS SM150 Firmware | ||
Siemens SINAMICS SM150i firmware | ||
Siemens SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants) Update 4 | <16 | 16 |
Siemens SIMATIC HMI Comfort Panels | <16 | 16 |
Siemens SIMATIC HMI Mobile Panels | <16 | 16 |
Siemens SIMATIC WinCC Runtime Advanced | <16 | 16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8280 has a critical severity level due to potential code execution risks via network connectivity.
To fix CVE-2019-8280, upgrade to UltraVNC revision 1204 or later.
CVE-2019-8280 affects UltraVNC versions up to 1.2.2.3 and various Siemens SINAMICS and SIMATIC products.
Yes, CVE-2019-8280 can be exploited remotely through network access.
Yes, a patch is available by upgrading to UltraVNC revision 1204, which resolves CVE-2019-8280.