This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior. The issues result from the lack of proper validation of user-supplied data, which can result in reads and writes past the end of allocated data structures. User interaction is required to exploit this vulnerability as an attacker must trick a valid user to open a malicious HMI project file.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-31299 This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior. The issues result from the lack of proper validation of user-supplied data, which can result in reads and writes past the end of allocated data structures. User interaction is required to exploit this vulnerability as an attacker must trick a valid user to open a malicious HMI project file.
Fixes

Solution

Horner Automation recommends affected users update to the latest version of Cscape Envision RV (Version 4.60). Users with questions regarding their specific software installations should contact their local Horner Automation service support team at either: techsppt@heapg.com (+1-317-916-4274), or technical.support@horner-apg.com (+353-(0)21-4321266 ext. 202) outside of the Americas


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T17:58:37.390Z

Reserved: 2021-12-16T00:00:00.000Z

Link: CVE-2021-44462

cve-icon Vulnrichment

Updated: 2024-08-04T04:25:16.858Z

cve-icon NVD

Status : Modified

Published: 2022-03-25T19:15:09.370

Modified: 2024-11-21T06:31:01.483

Link: CVE-2021-44462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.