First published: Thu Oct 07 2021(Updated: )
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fatek WinProladder | <=3.30 | |
Fatek Automation WinProladder | <=3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38434 is rated as high severity due to its potential for arbitrary code execution.
To fix CVE-2021-38434, upgrade FATEK WinProladder to version 3.31 or later, which includes the necessary patches.
CVE-2021-38434 affects FATEK Automation WinProladder versions up to and including 3.30.
CVE-2021-38434 is a code execution vulnerability caused by improper validation of user-supplied data.
Yes, CVE-2021-38434 can be exploited remotely if an attacker can supply a crafted project file to the application.