Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wccg-gr78-83xq

Опубликовано: 08 дек. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.6

Описание

Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are:

  • MMXFax.exe * winfax.dll

  • MelSim2ComProc.exe

  • Sim2ComProc.dll

  • MMXCall_in.exe * libdxxmt.dll

  • libsrlmt.dll

Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are:

  • MMXFax.exe * winfax.dll

  • MelSim2ComProc.exe

  • Sim2ComProc.dll

  • MMXCall_in.exe * libdxxmt.dll

  • libsrlmt.dll

6.6 Medium

CVSS3

Дефекты

CWE-426

Связанные уязвимости

nvd
около 2 лет назад

Rejected reason: This CVE ID has been rejected/withdrawn by its CVE Numbering Authority (Palo Alto Networks) based on discussions with Mitsubishi Electronics Corporation's PSIRT.

CVSS3: 7.8
fstec
около 2 лет назад

Уязвимость программного обеспечения для автоматизации, диспетчеризации и аналитики ICONICS Suite, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю выполнить произвольный код

6.6 Medium

CVSS3

Дефекты

CWE-426