Our new Biannual ICS Risk & Vulnerability Report is the most up-to-date look at CVEs disclosed in OT devices.
Check it out!
CWE-119: IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER The affected product’s code base doesn’t properly control arguments for specific functions, which could lead to a stack overflow. Successful exploitation of these vulnerabilities could allow an attacker to achieve remote code execution, and acquire complete remote control over the machine. Read: “Claroty, Auvesy Coordinate Disclosure on Versiondog Vulnerabilities”