Rewterz Threat Advisory – ICS: Mitsubishi Electric MELSEC iQ-R Series C Controller Module
October 8, 2021Rewterz Threat Alert – DanaBot Trojan – Active IOCs
October 8, 2021Rewterz Threat Advisory – ICS: Mitsubishi Electric MELSEC iQ-R Series C Controller Module
October 8, 2021Rewterz Threat Alert – DanaBot Trojan – Active IOCs
October 8, 2021Severity
High
Analysis Summary
CVE-2021-38432
The affected product lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
CVE-2021-38438
A use after free vulnerability may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.
CVE-2021-38426
The affected product lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.
CVE-2021-38434
The affected product lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.
CVE-2021-38430
The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.
CVE-2021-38436
The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a memory corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2021-38442
The affected product lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2021-38440
The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.
Impact
- Remote Code Execution
- Buffer Overflow
- Unauthorized Access
- Information Disclosure
Affected Vendors
FATEK Automation
Affected Products
- Communication Server: Versions 1.13 and prior
- WinProladder: Versions 3.30 and prior
Remediation
Refer to US-CERT Advisory for patch, upgrade, or suggested workaround information.
Refer to US-CERT Advisory for patch, upgrade, or suggested workaround information.