A malicious attacker could exploit the interface of the Fieldcomm Group HART-IP (release 1.0.0.0) by constructing messages with sufficiently large payloads to overflow the internal buffer and crash the device, or obtain control of the device.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-20-287-04 | Mitigation Third Party Advisory US Government Resource |
Information
Published : 2022-05-19 11:15
Updated : 2022-06-02 07:08
NVD link : CVE-2020-16209
Mitre link : CVE-2020-16209
JSON object : View
CWE
CWE-121
Stack-based Buffer Overflow
Products Affected
fieldcommgroup
- hart-ip_developer_kit
- hart-ip_developer_kit_firmware
- hipserver