Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2014-0789 | An ActiveX control in GenLaunch.htm in ICONICS GENESIS32 8.0, 8.02, 8.04, and 8.05 allows remote attackers to execute arbitrary programs via a crafted HTML document. |
Solution
No solution given by the vendor.
Workaround
ICONICS provides information and useful links related to its security patches at its web site at http://www.iconics.com/certs .ICONICS also recommends users of GENESIS32 V8 systems take the following mitigation steps: * Use a firewall, place control system networks and devices behind firewalls and isolate them from the business network. * Do not click web links or open unsolicited attachments in e-mail messages. * Install the patch. The ICONICS web site also provides a downloadable whitepaper on security vulnerabilities (registration required for download). The whitepaper on security vulnerabilities contains overview, details and mitigation plan for regarding buffer overflow and memory corruption vulnerabilities for ICONICS GENESIS32 and GENESIS64 supervisory control and data acquisition (SCADA) products.
Fri, 22 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | ICONICS GENESIS32 Exposed Dangerous Method or Function | |
Weaknesses | CWE-749 | |
References |
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-22T23:00:45.832Z
Reserved: 2014-01-02T00:00:00
Link: CVE-2014-0758

No data.

Status : Deferred
Published: 2014-02-24T04:48:10.193
Modified: 2025-08-22T23:15:30.820
Link: CVE-2014-0758

No data.

No data.