First published: Wed Feb 08 2023(Updated: )
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics DIAScreen | ||
Delta Electronics DIAScreen | <=1.2.1.23 |
Delta Electronics released version 1.3.0 of DIAScreen https://deltaiastudio.b2clogin.com/deltaiastudio.onmicrosoft.com/oauth2/v2.0/authorize (login required) and recommends users install this update on all affected systems.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0250 is a vulnerability in Delta Electronics DIAScreen versions 1.2.1.23 and prior that allows an attacker to remotely execute arbitrary code.
CVE-2023-0250 has a severity score of 7.8, which is considered high.
CVE-2023-0250 affects Delta Electronics DIAScreen versions 1.2.1.23 and prior by exploiting a stack-based buffer overflow vulnerability.
An attacker can exploit CVE-2023-0250 by remotely executing arbitrary code through the stack-based buffer overflow vulnerability in Delta Electronics DIAScreen.
At the moment, there is no known fix available for CVE-2023-0250. It is recommended to update to a newer version of Delta Electronics DIAScreen once a fix is released.