CVE-2018-10628
high-risk
Published 2018-07-24
AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.
Do I need to act?
~
7.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
Intouch 2014
Intouch 2014
Intouch 2017
Intouch 2017
Intouch 2017
Affected Vendors
References (6)
Broken Link
http://www.securityfocus.com/bid/104864
Broken Link
http://www.securityfocus.com/bid/104864
53
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
9/34 · Low
Exposure
12/34 · Low