Vulnerability Description
SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utilization. Restart of the application is required.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Selinc | Acselerator Architect | <= 2.2.24.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/152951/SEL-AcSELerator-Architect-2.2.24-Den
- https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02Third Party AdvisoryUS Government Resource
- http://packetstormsecurity.com/files/152951/SEL-AcSELerator-Architect-2.2.24-Den
- https://ics-cert.us-cert.gov/advisories/ICSA-18-191-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2018-10608?
CVE-2018-10608 is a vulnerability with a CVSS score of 7.5 (HIGH). SEL AcSELerator Architect version 2.2.24.0 and prior can be exploited when the AcSELerator Architect FTP client connects to a malicious FTP server, which may cause denial of service via 100% CPU utili...
How severe is CVE-2018-10608?
CVE-2018-10608 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10608?
Check the references section above for vendor advisories and patch information. Affected products include: Selinc Acselerator Architect.