Impact
This vulnerability is a stack‑based buffer overflow that allows an attacker to send crafted data to Softing Industrial Automation gateway devices and corrupt stack memory. The overflow can lead to arbitrary code execution or cause the device to crash. The impact on a supervisory control system is the potential compromise of device integrity and availability, which could threaten the safety and reliability of the processes it controls.
Affected Systems
Affected products include Softing pnGate (vulnerable through 1.30), epGate (vulnerable through 1.30), mbGate (vulnerable through 1.30), smartLink HW‑DP (vulnerable through 1.30), and smartLink HW‑PN (vulnerable through 1.01). Official fixes exist for pnGate (1.34), smartLink HW‑DP (1.31), and smartLink HW‑PN (1.02). No fix for epGate or mbGate has been released; affected users should monitor vendor releases and contact Softing for guidance.
Risk and Exploitability
The CVSS score of 6.5 denotes moderate severity. No EPSS score is available, so the precise likelihood of exploitation cannot be quantified, but the presence of a buffer overflow and the lack of a patch for several devices raises concerns. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been reported. Based on the description, the likely attack vector is remote network or command‑protocol interaction, where an attacker sends maliciously constructed data packets that trigger the stack overflow.
OpenCVE Enrichment