First published: Thu May 13 2021(Updated: )
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Omron CX-One | <=4.60 | |
Omron Cx-server | <=5.0.29 | |
Omron CX-One | ||
Omron CX-One Versions 4.60 and prior, including the following applications: CX-Server Versions 5.0.29.0 and prior | ||
Omron CX-Server Versions 5.0.29.0 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-27413.
The severity level of CVE-2021-27413 is high with a score of 7.8.
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are affected by CVE-2021-27413.
CVE-2021-27413 allows an attacker to execute arbitrary code due to a stack-based buffer overflow.
Yes, you can find references for CVE-2021-27413 at the following links: 1. [US-CERT Advisory](https://us-cert.cisa.gov/ics/advisories/icsa-21-131-01) 2. [Zero Day Initiative Advisory](https://www.zerodayinitiative.com/advisories/ZDI-21-588/)