Vulnerability Description
Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32538 and CVE-2023-32273.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fujielectric | Tellus | 4.0.15.0 |
| Fujielectric | Tellus Lite | 4.0.15.0 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/vu/JVNVU98818508/Third Party Advisory
- https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.phpRelease Notes
- https://jvn.jp/en/vu/JVNVU98818508/Third Party Advisory
- https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.phpRelease Notes
FAQ
What is CVE-2023-32201?
CVE-2023-32201 is a vulnerability with a CVSS score of 7.8 (HIGH). Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution...
How severe is CVE-2023-32201?
CVE-2023-32201 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32201?
Check the references section above for vendor advisories and patch information. Affected products include: Fujielectric Tellus, Fujielectric Tellus Lite.