Description
FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
No analysis available yet.
Remediation
Vendor Workaround
FATEK Automation has not responded to requests to work with CISA to mitigate this vulnerability. Users of these affected products are invited to contact FATEK customer support for additional information.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-24884 | FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code. |
References
| Link | Providers |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T18:54:26.198Z
Reserved: 2021-08-10T00:00:00.000Z
Link: CVE-2021-38432
No data.
Status : Modified
Published: 2021-10-15T15:15:08.390
Modified: 2024-11-21T06:17:05.177
Link: CVE-2021-38432
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD