CVE-2020-27297

The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to manipulate memory with controlled values and remotely execute code on the OPC UA Tunneller (versions prior to 6.3.0.8233).
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:honeywell:opc_ua_tunneller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 - Third Party Advisory, US Government Resource

Information

Published : 2021-01-26 19:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27297

Mitre link : CVE-2020-27297

CVE.ORG link : CVE-2020-27297


JSON object : View

Products Affected

honeywell

  • opc_ua_tunneller
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write