First published: Tue Dec 21 2021(Updated: )
This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior. The issues result from the lack of proper validation of user-supplied data, which can result in reads and writes past the end of allocated data structures. User interaction is required to exploit this vulnerability as an attacker must trick a valid user to open a malicious HMI project file.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Hornerautomation Cscape Envisionrv | <=4.50.3.1 | |
Horner Automation Cscape EnvisionRV v4.50.3.1 and prior |
Horner Automation recommends affected users update to the latest version of Cscape Envision RV (Version 4.60). Users with questions regarding their specific software installations should contact their local Horner Automation service support team at either: techsppt@heapg.com (+1-317-916-4274), or technical.support@horner-apg.com (+353-(0)21-4321266 ext. 202) outside of the Americas
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-44462.
This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior.
The severity of CVE-2021-44462 is high with a CVSS score of 7.1.
Horner Automation Cscape EnvisionRV version 4.50.3.1 and prior versions are affected by CVE-2021-44462.
To fix CVE-2021-44462, it is recommended to update Horner Automation Cscape EnvisionRV to a version beyond 4.50.3.1.