First published: Fri Feb 25 2022(Updated: )
The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Fatek FvDesigner | <=1.5.100 | |
Fatek Automation FvDesigner | <=1.5.100 |
FATEK has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact FATEK customer support for additional information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25170 has a high severity rating due to its stack-based buffer overflow vulnerability that could lead to arbitrary code execution.
To fix CVE-2022-25170, update Fatek FvDesigner to the latest version beyond 1.5.100 to mitigate the vulnerability.
CVE-2022-25170 is identified as a stack-based buffer overflow vulnerability affecting Fatek FvDesigner.
Yes, CVE-2022-25170 may allow an attacker to exploit the vulnerability remotely if they can process project files.
CVE-2022-25170 affects Fatek FvDesigner versions up to and including 1.5.100.