Vulnerability Description
Using custom code, an attacker can write into name or description fields larger than the appropriate buffer size causing a stack-based buffer overflow on Host Engineering H0-ECOM100 Communications Module Firmware versions v5.0.155 and prior. This may allow an attacker to crash the affected device or cause it to become unresponsive.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hosteng | H0-Ecom100 Firmware | < 5.0.156 |
| Hosteng | H0-Ecom100 | - |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-04MitigationThird Party AdvisoryUS Government Resource
- https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-04MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2022-3228?
CVE-2022-3228 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Using custom code, an attacker can write into name or description fields larger than the appropriate buffer size causing a stack-based buffer overflow on Host Engineering H0-ECOM100 Communications Mod...
How severe is CVE-2022-3228?
CVE-2022-3228 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3228?
Check the references section above for vendor advisories and patch information. Affected products include: Hosteng H0-Ecom100 Firmware, Hosteng H0-Ecom100.