First published: Tue Feb 14 2023(Updated: )
A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens COMOS | >=10.2<10.3.3.1.45 | |
Siemens COMOS | >=10.3.3.2<10.3.3.2.33 | |
Siemens COMOS | >=10.3.3.3<10.3.3.3.9 | |
Siemens COMOS | >=10.3.3.4<10.3.3.4.6 | |
Siemens COMOS | >=10.4.0.0<10.4.0.0.31 | |
Siemens COMOS | >=10.4.1.0<10.4.1.0.32 | |
Siemens COMOS | >=10.4.2.0<10.4.2.0.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-24482.
CVE-2023-24482 has a severity rating of 9.8 (Critical).
CVE-2023-24482 affects multiple versions of Siemens COMOS, including V10.2, V10.3.3.1, V10.3.3.2, V10.3.3.3, V10.3.3.4, V10.4.0.0, V10.4.1.0, and V10.4.2.0.
CVE-2023-24482 is associated with CWE-119 and CWE-120.
More information about CVE-2023-24482 can be found at https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf.