First published: Tue Jan 26 2021(Updated: )
The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to manipulate memory with controlled values and remotely execute code on the OPC UA Tunneller (versions prior to 6.3.0.8233).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Opc Ua Tunneller | <6.3.0.8233 | |
Matrikon, a subsidiary of Honeywell OPC UA Tunneller | <6.3.0.8233 | 6.3.0.8233 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-27297.
The severity of CVE-2020-27297 is critical with a score of 9.8.
The Honeywell OPC UA Tunneller (versions prior to 6.3.0.8233) is affected by CVE-2020-27297.
CVE-2020-27297 allows an attacker to manipulate memory with controlled values and remotely execute code on the affected product.
Yes, updating the OPC UA Tunneller to version 6.3.0.8233 or later will fix CVE-2020-27297.