Описание
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 2.28 (исключая)
Одновременно
cpe:2.3:o:rtautomation:499es_ethernet\/ip_adaptor_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:rtautomation:499es_ethernet\/ip_adaptor:-:*:*:*:*:*:*:*
EPSS
Процентиль: 66%
0.00504
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-121
CWE-787
Связанные уязвимости
github
больше 3 лет назад
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
EPSS
Процентиль: 66%
0.00504
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-121
CWE-787