CVE-2022-2866 – FATEK Automation FvDesigner Out-of-bounds Write
https://notcve.org/view.php?id=CVE-2022-2866
FATEK FvDesigner version 1.5.103 and prior is vulnerable to an out-of-bounds write while processing project files. If a valid user is tricked into using maliciously crafted project files, an attacker could achieve arbitrary code execution. FATEK FvDesigner versión 1.5.103 y anteriores, es vulnerable a una escritura fuera de límites mientras son procesados archivos de proyecto. Si es engañado a un usuario válido para que use archivos de proyecto mal diseñados, un atacante podría lograr una ejecución de código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FPJ files. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-237-01 • CWE-787: Out-of-bounds Write •
CVE-2022-25170 – ICSA-22-055-01 FATEK Automation FvDesigner
https://notcve.org/view.php?id=CVE-2022-25170
The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code El producto afectado es vulnerable a un desbordamiento del búfer en la región stack de la memoria mientras procesa archivos de proyecto, lo que puede permitir a un atacante ejecutar código arbitrario • https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2022-21209 – ICSA-22-055-01 FATEK Automation FvDesigner
https://notcve.org/view.php?id=CVE-2022-21209
The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution. El producto afectado es vulnerable a una lectura fuera de límites mientras son procesados archivos de proyecto, lo que permite a un atacante diseñar un archivo de proyecto que permita una ejecución de código arbitrario. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 https://www.zerodayinitiative.com/advisories/ZDI-22-435 https://www.zerodayinitiative.com/advisories/ZDI-22-436 https://www.zerodayinitiative.com/advisories/ZDI-22-439 • CWE-125: Out-of-bounds Read •
CVE-2022-23985 – ICSA-22-055-01 FATEK Automation FvDesigner
https://notcve.org/view.php?id=CVE-2022-23985
The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution. El producto afectado es vulnerable a una escritura fuera de límites mientras procesa archivos de proyecto, lo que permite a un atacante diseñar un archivo de proyecto que permita la ejecución de código arbitrario. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 https://www.zerodayinitiative.com/advisories/ZDI-22-432 https://www.zerodayinitiative.com/advisories/ZDI-22-433 https://www.zerodayinitiative.com/advisories/ZDI-22-434 https://www.zerodayinitiative.com/advisories/ZDI-22-437 https://www.zerodayinitiative.com/advisories/ZDI-22-438 https://www.zerodayinitiative.com/advisories/ZDI-22-440 • CWE-787: Out-of-bounds Write •
CVE-2021-32939 – Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-32939
FATEK Automation FvDesigner, Versions 1.5.88 and prior is vulnerable to an out-of-bounds write while processing project files, allowing an attacker to craft a project file that may permit arbitrary code execution. FATEK Automation FvDesigner, Versiones 1.5.88 y anteriores, es vulnerable a una escritura fuera de límites mientras procesa archivos de proyecto, permitiendo a un atacante diseñar un archivo de proyecto que puede permitir una ejecución de código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fatek Automation FvDesigner. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FPJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://us-cert.cisa.gov/ics/advisories/icsa-21-217-02 https://www.zerodayinitiative.com/advisories/ZDI-21-1028 • CWE-787: Out-of-bounds Write •