CVE-2016-8352
moderate-risk
Published 2017-02-13
An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code.
Do I need to act?
~
2.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Connexium Firmware
Affected Vendors
References (4)
Third Party Advisory
http://www.securityfocus.com/bid/94062
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-16-306-01
Third Party Advisory
http://www.securityfocus.com/bid/94062
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSA-16-306-01
44
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal