Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Solution:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-191-01 | government resource third party advisory us government resource |