Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Solution:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-21 | third party advisory us government resource government resource |