Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
The exploitation of this vulnerability could result in loss of data or remote code execution due to missing length checks when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in disclosure of information or execution of arbitrary code due to lack of input validation when a malicious CGF (Configuration Group File) is imported to IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to missing size checks when a malicious WSP (Workspace) file is being parsed by IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to missing length checks when a malicious WSP file is being parsed by IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to a lack of proper validation of user-supplied data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in disclosure of information or remote code execution due to a lack of sanity checks on user-supplied data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in disclosure of information or remote code execution due to a lack of user-supplied data validation when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in disclosure of information or remote code execution due to a lack of validation on user-supplied input data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to a lack of validation of user-supplied input data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to the use of unchecked input data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in loss of data or remote code execution due to missing checks of user-supplied input data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in disclosure of information or remote code execution due to a missing length check on user-supplied data when a malicious CGF file is imported to IGSS Definition.
The exploitation of this vulnerability could result in remote code execution when a malicious CGF or WSP file is being parsed by IGSS Definition.
Schneider Electric
Refer to vendor advisory for the complete list of affected products and their respective patches at https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04