Vulnerability Description
FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fatek | Communication Server Firmware | <= 1.13 |
| Fatek | Communication Server | - |
Related Weaknesses (CWE)
References
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07Third Party AdvisoryUS Government Resource
- https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-38432?
CVE-2021-38432 is a vulnerability with a CVSS score of 9.8 (CRITICAL). FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remo...
How severe is CVE-2021-38432?
CVE-2021-38432 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-38432?
Check the references section above for vendor advisories and patch information. Affected products include: Fatek Communication Server Firmware, Fatek Communication Server.