Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 | Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 - Third Party Advisory, US Government Resource | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
07 Nov 2023, 03:53
Type | Values Removed | Values Added |
---|---|---|
Summary | Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution. |
Information
Published : 2023-01-18 01:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41989
Mitre link : CVE-2022-41989
CVE.ORG link : CVE-2022-41989
JSON object : View
Products Affected
sewio
- real-time_location_system_studio
CWE
CWE-787
Out-of-bounds Write