Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-29910 | The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code |
Solution
FATEK has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact FATEK customer support for additional information.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 |
|
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T18:00:47.051Z
Reserved: 2022-02-22T00:00:00.000Z
Link: CVE-2022-25170
Updated: 2024-08-03T04:36:05.097Z
Status : Modified
Published: 2022-02-25T19:15:25.597
Modified: 2024-11-21T06:51:44.653
Link: CVE-2022-25170
No data.
OpenCVE Enrichment
No data.
EUVD