First published: Mon Oct 18 2021(Updated: )
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
FATEK WinProladder | <=3.30 | |
Fatek Automation WinProladder | <=3.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-38436 is rated as high with a CVSS score of 7.8.
To mitigate CVE-2021-38436, it is recommended to update to a version beyond 3.30 that includes proper validation of user-supplied data.
CVE-2021-38436 could allow an attacker to execute arbitrary code in the context of the current process due to lack of proper validation of user-supplied data in FATEK Automation WinProladder.
For more information on CVE-2021-38436, you can refer to the advisory on the CISA website at the provided link.