First published: Wed Feb 09 2022(Updated: )
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric IGSS | ||
Schneider-electric Interactive Graphical Scada System Data Server | <=15.0.0.22020 | |
Schneider Electric IGSS Data Server (IGSSdataServer.exe): v15.0.0.22020 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24313 refers to a stack-based buffer overflow remote code execution vulnerability in Schneider Electric IGSS.
CVE-2022-24313 has a severity rating of 9.8 (Critical).
CVE-2022-24313 allows remote attackers to execute arbitrary code on affected installations of Schneider Electric IGSS without authentication.
CVE-2022-24313 affects Schneider Electric IGSS Data Server versions up to and including 15.0.0.22020.
To fix CVE-2022-24313, it is recommended to apply the security patches and updates provided by Schneider Electric.