First published: Mon Jan 30 2023(Updated: )
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow, potentially leading to remote code execution when an attacker sends specially crafted online data request messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22170)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Interactive Graphical Scada System | <=15.0.0.22170 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32523 is a Buffer Copy without Checking Size of Input vulnerability that could lead to a stack-based buffer overflow and remote code execution in Schneider-electric Interactive Graphical Scada System (IGSS) Data Server.
CVE-2022-32523 has a severity rating of 9.8 (critical).
CVE-2022-32523 occurs when an attacker sends specially crafted online data request messages, triggering a buffer overflow in IGSS Data Server.
IGSS Data Server version 15.0.0.22170 is affected by CVE-2022-32523.
Yes, Schneider Electric has released a security notification with guidance on mitigating the vulnerability. Refer to the provided reference link for more information.