This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Schneider Electric IGSS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the IGSSDataServer process, which listens on TCP port 12401 by default. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to create a denial-of-service condition on the IGSS application.
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric IGSS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-322 is rated as critical due to its ability to cause a denial-of-service condition.
To mitigate ZDI-22-322, it is recommended to update Schneider Electric IGSS to the latest version provided by the vendor.
Yes, ZDI-22-322 can be exploited by remote attackers without requiring any authentication.
ZDI-22-322 affects Schneider Electric IGSS installations.
ZDI-22-322 is classified as a denial-of-service vulnerability.