Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions.
Fixes

Solution

Schneider Electric has developed a patch to resolve this issue. In order to patch the installation in the field, install OFS V3.5SP1, available on Schneider Electric’s web site at the following URL:  http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page


Workaround

No workaround given by the vendor.

History

Thu, 25 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
Title Schneider Electric OPC Factory Server Buffer Overflow
Weaknesses CWE-122
References
Metrics cvssV2_0

{'score': 7.8, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:C'}

cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-25T17:45:27.086Z

Reserved: 2014-01-02T00:00:00

Link: CVE-2014-0789

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-04-04T15:09:45.917

Modified: 2025-09-25T18:15:36.177

Link: CVE-2014-0789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.