Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-45093 Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

Sewio also recommends the following workarounds to reduce the risk of exploitation: * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . * Locate control system networks and remote devices behind firewalls and isolate them from business networks.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T22:00:32.860Z

Reserved: 2022-12-21T18:52:32.337Z

Link: CVE-2022-41989

cve-icon Vulnrichment

Updated: 2024-08-03T12:56:39.105Z

cve-icon NVD

Status : Modified

Published: 2023-01-18T01:15:11.960

Modified: 2024-11-21T07:24:13.533

Link: CVE-2022-41989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.