First published: Tue Jun 06 2023(Updated: )
The affected application lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e374b. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Horner Automation Cscape | =9.90-sp8 | |
Hornerautomation Cscape Envisionrv | =4.70 | |
Horner Automation Cscape: v9.90 SP8 | ||
Horner Automation Cscape EnvisionRV | =4.70 | |
Hornerautomation Cscape | =9.90-sp8 |
Horner Automation recommends upgrading the following software: * Cscape: Update to v9.90 SP9 https://hornerautomation.com/cscape-software/ * Cscape Envision RV: Update to v4.80 https://hornerautomation.com/product/cscape-envision-rv/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32203 is a vulnerability in the Horner Automation Cscape and Cscape Envisionrv applications that allows an attacker to execute arbitrary code by exploiting improper validation of user-supplied data when parsing project files.
The severity of CVE-2023-32203 is high, with a CVSS score of 7.8.
Horner Automation Cscape version 9.90-sp8 and Cscape Envisionrv version 4.70 are affected by CVE-2023-32203.
An attacker can exploit CVE-2023-32203 by leveraging the out-of-bounds write vulnerability at CScape_EnvisionRV+0x2e374b to execute arbitrary code in the context of the affected application.
As of now, there is no known fix or patch available for CVE-2023-32203. It is recommended to follow the guidance provided by the vendor or the official advisory.