Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02 | Third Party Advisory US Government Resource |
https://www.zerodayinitiative.com/advisories/ZDI-22-580/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-22-575/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-22-576/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-22-579/ | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2022-04-01 16:15
Updated : 2022-04-08 06:13
NVD link : CVE-2022-26419
Mitre link : CVE-2022-26419
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
omron
- cx-position