First published: Mon Jan 30 2023(Updated: )
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause a stack-based buffer overflow, potentially leading to remote code execution when an attacker sends specially crafted log data request messages. Affected Products: IGSS Data Server - IGSSdataServer.exe (Versions prior to V15.0.0.22170)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Interactive Graphical Scada System | <=15.0.0.22170 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32529 refers to a CWE-120 vulnerability in Schneider-electric Interactive Graphical Scada System (IGSS) Data Server, which allows a stack-based buffer overflow leading to potential remote code execution.
The severity of CVE-2022-32529 is rated as critical with a CVSS score of 9.8 out of 10.
The affected software version of CVE-2022-32529 is up to and inclusive of 15.0.0.22170 of Schneider-electric Interactive Graphical Scada System (IGSS) Data Server.
An attacker can exploit CVE-2022-32529 by sending specially crafted log data request messages, triggering a stack-based buffer overflow and potentially allowing for remote code execution.
Schneider-electric has released a security notification (SEVD-2022-165-01) that provides details on mitigations and patches for CVE-2022-32529.