Lucene search

K
cveSiemensCVE-2023-24482
HistoryFeb 14, 2023 - 11:15 a.m.

CVE-2023-24482

2023-02-1411:15:14
CWE-120
siemens
web.nvd.nist.gov
29
cve-2023-24482
comos
v10.2
v10.3.3
v10.4
buffer overflow
seh
vulnerability
nvd

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

61.3%

A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.

Affected configurations

Nvd
Node
siemenscomosRange10.210.3.3.1.45
OR
siemenscomosRange10.3.3.210.3.3.2.33
OR
siemenscomosRange10.3.3.310.3.3.3.9
OR
siemenscomosRange10.3.3.410.3.3.4.6
OR
siemenscomosRange10.4.0.010.4.0.0.31
OR
siemenscomosRange10.4.1.010.4.1.0.32
OR
siemenscomosRange10.4.2.010.4.2.0.25
VendorProductVersionCPE
siemenscomos*cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Siemens",
    "product": "COMOS V10.2",
    "versions": [
      {
        "version": "All versions",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.3.3.1",
    "versions": [
      {
        "version": "All versions < V10.3.3.1.45",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.3.3.2",
    "versions": [
      {
        "version": "All versions < V10.3.3.2.33",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.3.3.3",
    "versions": [
      {
        "version": "All versions < V10.3.3.3.9",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.3.3.4",
    "versions": [
      {
        "version": "All versions < V10.3.3.4.6",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.4.0.0",
    "versions": [
      {
        "version": "All versions < V10.4.0.0.31",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.4.1.0",
    "versions": [
      {
        "version": "All versions < V10.4.1.0.32",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "vendor": "Siemens",
    "product": "COMOS V10.4.2.0",
    "versions": [
      {
        "version": "All versions < V10.4.2.0.25",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

9.6

Confidence

High

EPSS

0.002

Percentile

61.3%

Related for CVE-2023-24482