A heap-based buffer overflow vulnerability exists in the Programming Software Connection FiBurn functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to a buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Secondary | 3.1 | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Hyperlink | Source | Resource |
|---|---|---|
| https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003y1F2AQ/sa00025 | talos-cna@cisco.com | Vendor Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1936 | talos-cna@cisco.com | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1936 | talos-cna@cisco.com | Exploit Third Party Advisory |
| https://community.automationdirect.com/s/internal-database-security-advisory/a4GPE0000003y1F2AQ/sa00025 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2024-1936 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1936 | af854a3a-2127-422b-91ae-364da2661108 | Exploit Third Party Advisory |