Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2023-7339
PUBLISHED
More InfoOfficial Page
Assigner-Softing
Assigner Org ID-10de8ef9-5c89-4b17-8228-e97b74acf4bd
View Known Exploited Vulnerability (KEV) details
Published At-27 Mar, 2026 | 10:53
Updated At-27 Mar, 2026 | 12:21
Rejected At-
▼CVE Numbering Authority (CNA)
Data collection for dowloading leads into buffer overflow

Stack-based buffer overflow vulnerability in Softing Industrial Automation GmbH gateways allows overflow buffers. This issue affects pnGate: through 1.30 epGate: through 1.30 mbGate: through 1.30 smartLink HW-DP: through 1.30 smartLink HW-PN: through 1.01.

Affected Products
Vendor
Softing
Product
pnGate
Default Status
unaffected
Versions
Affected
  • From 0 through 1.30 (custom)
Unaffected
  • 1.34 (custom)
Vendor
Softing
Product
epGate
Default Status
unaffected
Versions
Affected
  • From 0 through 1.30 (custom)
Vendor
Softing
Product
mbGate
Default Status
unaffected
Versions
Affected
  • From 0 through 1.30 (custom)
Vendor
Softing
Product
smartLink HW-DP
Default Status
unaffected
Versions
Affected
  • From 0 through 1.30 (custom)
Unaffected
  • 1.31 (custom)
Vendor
Softing
Product
smartLink HW-PN
Default Status
unaffected
Versions
Affected
  • From 0 through 1.01 (custom)
Unaffected
  • 1.02 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-121CWE-121 Stack-based Buffer Overflow
Type: CWE
CWE ID: CWE-121
Description: CWE-121 Stack-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-100CAPEC-100 Overflow Buffers
CAPEC ID: CAPEC-100
Description: CAPEC-100 Overflow Buffers
Solutions

pnGate: fixed with 1.34

smartLink HW-DP: fixed with 1.31 smartLink HW-PN: fixed with 1.02

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.html
x_html
https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.json
x_json
Hyperlink: https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.html
Resource:
x_html
Hyperlink: https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.json
Resource:
x_json
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.html
broken-link
https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.json
broken-link
Hyperlink: https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.html
Resource:
broken-link
Hyperlink: https://industrial.softing.com/fileadmin/psirt/downloads/2023/CVE-2023-7339.json
Resource:
broken-link
Details not found