CVE-2023-24482

A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
siemensCNA
10 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 46%
VendorProductVersion
siemenscomos
10.2 ≤
𝑥
< 10.3.3.1.45
siemenscomos
10.3.3.2 ≤
𝑥
< 10.3.3.2.33
siemenscomos
10.3.3.3 ≤
𝑥
< 10.3.3.3.9
siemenscomos
10.3.3.4 ≤
𝑥
< 10.3.3.4.6
siemenscomos
10.4.0.0 ≤
𝑥
< 10.4.0.0.31
siemenscomos
10.4.1.0 ≤
𝑥
< 10.4.1.0.32
siemenscomos
10.4.2.0 ≤
𝑥
< 10.4.2.0.25
𝑥
= Vulnerable software versions