8.1
CVE-2023-5401
- EPSS 1.63%
- Veröffentlicht 17.04.2024 17:15:13
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle psirt@honeywell.com
- CVE-Watchlists
- Unerledigt
Server receiving a malformed message based on a using the specified key values can cause a stack overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning.
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Herstellerhoneywell
≫
Produkt
experion_server
Default Statusunknown
Version <=
520.2 TCU4
Version
520.2
Status
affected
Version <=
510.2 HF13
Version
510.1
Status
affected
Version <=
520.1 TCU4
Version
520.1
Status
affected
Version <=
511.5 TCU4 HF3
Version
511.1
Status
affected
Version <=
511.5 TCU4 HF3
Version
520.2 TCU4 HFR2
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.63% | 0.813 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@honeywell.com | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).