First published: Wed Feb 01 2023(Updated: )
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22073)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Interactive Graphical Scada System | <15.0.0.22074 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24324 is a Buffer Copy without Checking Size of Input vulnerability that exists in the Schneider-electric Interactive Graphical Scada System prior to version 15.0.0.22074, which could result in a stack-based buffer overflow and potential remote code execution.
CVE-2022-24324 occurs due to a lack of proper size checking when copying input into a buffer, allowing an attacker to send a specially crafted message that triggers a stack-based buffer overflow.
CVE-2022-24324 has a severity rating of 9.8, which is considered critical.
The Schneider-electric Interactive Graphical Scada System versions prior to 15.0.0.22074 are affected by CVE-2022-24324.
To mitigate the CVE-2022-24324 vulnerability, it is recommended to update the Schneider-electric Interactive Graphical Scada System to version 15.0.0.22074 or newer as mentioned in the security notification issued by Schneider Electric.