First published: Wed Feb 08 2023(Updated: )
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through improper restrictions of operations within memory, which could allow an attacker to remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Diascreen | <=1.2.1.23 | |
Delta Electronics DIAScreen: versions 1.2.1.23 and prior |
Delta Electronics released version 1.3.0 of DIAScreen https://deltaiastudio.b2clogin.com/deltaiastudio.onmicrosoft.com/oauth2/v2.0/authorize (login required) and recommends users install this update on all affected systems.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Delta Electronics DIAScreen is CVE-2023-0251.
The severity of CVE-2023-0251 is high with a CVSS score of 7.8.
CVE-2023-0251 allows remote attackers to execute arbitrary code through a buffer overflow vulnerability in Delta Electronics DIAScreen versions 1.2.1.23 and prior.
The affected software version for CVE-2023-0251 is Delta Electronics DIAScreen 1.2.1.23 and prior.
At the moment, there is no information available about a fix for CVE-2023-0251. It is recommended to follow the guidance provided by the vendor or security advisories.