Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are:
* MMXFax.exe * winfax.dll
* MelSim2ComProc.exe
* Sim2ComProc.dll
* MMXCall_in.exe * libdxxmt.dll
* libsrlmt.dll
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: palo_alto
Published: 2023-12-07T23:21:22.755Z
Updated: 2024-08-02T08:21:17.173Z
Reserved: 2023-11-09T18:55:45.555Z
Link: CVE-2023-6061
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-12-08T00:15:07.853
Modified: 2024-11-21T08:43:03.907
Link: CVE-2023-6061
Redhat
No data.