FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2021-24884 | FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code. | 
Fixes
    Solution
No solution given by the vendor.
Workaround
FATEK Automation has not responded to requests to work with CISA to mitigate this vulnerability. Users of these affected products are invited to contact FATEK customer support for additional information.
References
        | Link | Providers | 
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07 | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T18:54:26.198Z
Reserved: 2021-08-10T00:00:00
Link: CVE-2021-38432
No data.
Status : Modified
Published: 2021-10-15T15:15:08.390
Modified: 2024-11-21T06:17:05.177
Link: CVE-2021-38432
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD