First published: Mon Dec 20 2021(Updated: )
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to a stack-based buffer overflow, which may allow an attacker to achieve code execution.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fujielectric V-server | <4.0.12.0 | |
Fujielectric V-simulator | <4.0.12.0 | |
Fuji Electric V-Server Lite | <4.0.12.0 | 4.0.12.0 |
Fuji Electric Tellus Lite V-Simulator | <4.0.12.0 | 4.0.12.0 |
Fuji Electric recommends updating software to the latest version: TELLUS Lite software: Version 4.0.12.0 Disk1 TELLUS Lite software: Version 4.0.12.0 Disk2 V-Server Lite software: Version 4.0.12.0 Disk1 V-Server Lite software: Version 4.0.12.0 Disk2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38413 is a vulnerability in Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 that allows an attacker to achieve code execution through a stack-based buffer overflow.
CVE-2021-38413 has a severity rating of 7.8 (high).
Fuji Electric V-Server Lite and Tellus Lite V-Simulator versions prior to v4.0.12.0 are affected by CVE-2021-38413.
An attacker can exploit CVE-2021-38413 by using a stack-based buffer overflow to execute arbitrary code.
Yes, upgrading to Fuji Electric V-Server Lite and Tellus Lite V-Simulator version v4.0.12.0 or later will fix the vulnerability.