The affected product is vulnerable to a network-based attack by threat actors supplying a crafted, malicious XML payload designed to trigger an external entity reference call.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-30851 | The affected product is vulnerable to a network-based attack by threat actors supplying a crafted, malicious XML payload designed to trigger an external entity reference call. |
Fixes
Solution
FANUC has created a new version to address these vulnerabilities. Users may obtain and install the new version by downloading ROBOGUIDE v9 Rev U or higher from the FANUC or FANUC America website (login required).
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 |
|
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:29:08.202Z
Reserved: 2021-11-17T00:00:00.000Z
Link: CVE-2021-43990
No data.
Status : Modified
Published: 2022-04-20T16:15:08.250
Modified: 2024-11-21T06:30:09.947
Link: CVE-2021-43990
No data.
OpenCVE Enrichment
No data.
EUVD