// For flags

CVE-2023-41375

 

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Use after free vulnerability exists in Kostac PLC Programming Software Version 1.6.11.0. Arbitrary code may be executed by having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier because the issue exists in parsing of KPP project files. The vendor states that Kostac PLC Programming Software Version 1.6.10.0 or later implements the function which prevents a project file alteration. Therefore, to mitigate the impact of these vulnerabilities, a project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier needs to be saved again using Kostac PLC Programming Software Version 1.6.10.0 or later.

Exista una vulnerabilidad de Use After Free en Kostac PLC Programming Software Versión 1.6.11.0. Se puede ejecutar código arbitrario haciendo que un usuario abra un archivo de proyecto especialmente manipulado que se guardó utilizando Kostac PLC Programming Software Versión 1.6.9.0 y anteriores porque el problema existe en el análisis de los archivos de proyecto KPP. El proveedor afirma que Kostac PLC Programming Software Versión 1.6.10.0 o posterior implementa la función que evita la alteración del archivo del proyecto. Por lo tanto, para mitigar el impacto de estas vulnerabilidades, un archivo de proyecto que se guardó utilizando Kostac PLC Programming Software Versión 1.6.9.0 y anteriores debe guardarse nuevamente utilizando Kostac PLC Programming Software Versión 1.6.10.0 o posterior.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-08-29 CVE Reserved
  • 2023-09-20 CVE Published
  • 2024-09-24 CVE Updated
  • 2024-10-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jtekt
Search vendor "Jtekt"
Kostac Plc
Search vendor "Jtekt" for product "Kostac Plc"
< 1.6.10.0
Search vendor "Jtekt" for product "Kostac Plc" and version " < 1.6.10.0"
-
Affected
Jtekt
Search vendor "Jtekt"
Kostac Plc
Search vendor "Jtekt" for product "Kostac Plc"
1.6.11.0
Search vendor "Jtekt" for product "Kostac Plc" and version "1.6.11.0"
-
Affected