CVE-2018-3991
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.
Existe una vulnerabilidad de desbordamiento de memoria dinámica (heap) explotable en la función WkbProgramLow de WibuKey Network server management en su versión 6.40.2402.500. Un paquete TCP especialmente manipulado puede provocar un desbordamiento de memoria dinámica (heap), lo que podría dar lugar a la ejecución remota de código. Un atacante puede enviar un paquete TCP mal formado para provocar esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-01-02 CVE Reserved
- 2019-02-05 CVE Published
- 2024-06-28 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/107005 | Third Party Advisory | |
https://cert-portal.siemens.com/productcert/pdf/ssa-760124.pdf | Mitigation | |
https://cert-portal.siemens.com/productcert/pdf/ssa-844562.pdf | Third Party Advisory | |
https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0659 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wibu Search vendor "Wibu" | Wibukey Search vendor "Wibu" for product "Wibukey" | 6.40.2402.500 Search vendor "Wibu" for product "Wibukey" and version "6.40.2402.500" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|
Siemens Search vendor "Siemens" | Simatic Wincc Open Architecture Search vendor "Siemens" for product "Simatic Wincc Open Architecture" | 3.14 Search vendor "Siemens" for product "Simatic Wincc Open Architecture" and version "3.14" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Simatic Wincc Open Architecture Search vendor "Siemens" for product "Simatic Wincc Open Architecture" | 3.15 Search vendor "Siemens" for product "Simatic Wincc Open Architecture" and version "3.15" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Simatic Wincc Open Architecture Search vendor "Siemens" for product "Simatic Wincc Open Architecture" | 3.16 Search vendor "Siemens" for product "Simatic Wincc Open Architecture" and version "3.16" | - |
Affected
|