Learn about CVE-2018-10628 affecting AVEVA InTouch software versions 2014 R2 SP1 and earlier, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2. Discover the impact, technical details, and mitigation steps.
CVE-2018-10628, affecting AVEVA InTouch software, involves a vulnerability that allows unauthenticated users to trigger a buffer overflow, potentially leading to remote code execution.
Understanding CVE-2018-10628
CVE-2018-10628 is a security vulnerability in AVEVA InTouch software versions 2014 R2 SP1 and earlier, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2.
What is CVE-2018-10628?
The vulnerability in AVEVA InTouch software versions allows unauthenticated users to exploit a buffer overflow by sending a specially crafted packet, potentially leading to remote code execution.
The Impact of CVE-2018-10628
If successfully exploited, this vulnerability could result in remote code execution with the privileges of the InTouch View process.
Technical Details of CVE-2018-10628
CVE-2018-10628 is classified as a STACK-BASED BUFFER OVERFLOW (CWE-121) vulnerability.
Vulnerability Description
The vulnerability in AVEVA InTouch software versions 2014 R2 SP1 and earlier, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allows unauthenticated users to trigger a buffer overflow by sending a carefully designed packet.
Affected Systems and Versions
Exploitation Mechanism
Exploitation of this vulnerability involves sending a specially crafted packet that triggers a buffer overflow on systems not using a dot as a floating point separator.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent the exploitation of CVE-2018-10628.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates