Логотип exploitDog
bind:CVE-2023-32174
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32174

Количество 3

Количество 3

nvd логотип

CVE-2023-32174

почти 2 года назад

Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability when the product is in its default configuration. The specific flaw exists within the handling of NodeManagerOpcUa objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. . Was ZDI-CAN-20577.

CVSS3: 9.1
EPSS: Низкий
github логотип

GHSA-frf6-mj64-p4rr

почти 2 года назад

Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability when the product is in its default configuration. The specific flaw exists within the handling of NodeManagerOpcUa objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20577.

CVSS3: 9.1
EPSS: Низкий
fstec логотип

BDU:2023-09027

почти 3 года назад

Уязвимость обработчика объектов NodeManagerOpcUa программного средства миграции серверов Unified Automation UaGateway, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32174

Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability when the product is in its default configuration. The specific flaw exists within the handling of NodeManagerOpcUa objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. . Was ZDI-CAN-20577.

CVSS3: 9.1
7%
Низкий
почти 2 года назад
github логотип
GHSA-frf6-mj64-p4rr

Unified Automation UaGateway NodeManagerOpcUa Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability when the product is in its default configuration. The specific flaw exists within the handling of NodeManagerOpcUa objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20577.

CVSS3: 9.1
7%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-09027

Уязвимость обработчика объектов NodeManagerOpcUa программного средства миграции серверов Unified Automation UaGateway, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.1
7%
Низкий
почти 3 года назад

Уязвимостей на страницу