First published: Thu Oct 07 2021(Updated: )
FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fatek WinProladder | <=3.30 | |
Fatek Automation WinProladder | <=3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38430 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To mitigate CVE-2021-38430, update FATEK Automation WinProladder to version 3.31 or later.
An attacker could exploit CVE-2021-38430 to execute arbitrary code through a stack-based buffer overflow.
CVE-2021-38430 affects FATEK Automation WinProladder versions up to and including 3.30.
Yes, CVE-2021-38430 involves improper validation of user-supplied data when parsing project files.