A malicious attacker could exploit the interface of the Fieldcomm Group HART-IP (release 1.0.0.0) by constructing messages with sufficiently large payloads to overflow the internal buffer and crash the device, or obtain control of the device.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-20-287-04 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2022-05-19 18:15
Updated : 2024-02-28 19:09
NVD link : CVE-2020-16209
Mitre link : CVE-2020-16209
CVE.ORG link : CVE-2020-16209
JSON object : View
Products Affected
fieldcommgroup
- hipserver
- hart-ip_developer_kit_firmware
- hart-ip_developer_kit
CWE
CWE-121
Stack-based Buffer Overflow