Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are: * MMXFax.exe * winfax.dll * MelSim2ComProc.exe * Sim2ComProc.dll * MMXCall_in.exe * libdxxmt.dll * libsrlmt.dll
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published: 2023-12-07T23:21:22.755Z

Updated: 2024-08-02T08:21:17.173Z

Reserved: 2023-11-09T18:55:45.555Z

Link: CVE-2023-6061

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-08T00:15:07.853

Modified: 2024-11-21T08:43:03.907

Link: CVE-2023-6061

cve-icon Redhat

No data.