CVE-2018-10628

high-risk
Published 2018-07-24

AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.

Do I need to act?

~
7.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (5)

Intouch 2014
Intouch 2014
Intouch 2017
Intouch 2017
Intouch 2017

Affected Vendors

53
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 9/34 · Low
Exposure 12/34 · Low