CVE-2020-27297

The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to manipulate memory with controlled values and remotely execute code on the OPC UA Tunneller (versions prior to 6.3.0.8233).
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:honeywell:opc_ua_tunneller:*:*:*:*:*:*:*:*

History

03 Feb 2021, 15:30

Type Values Removed Values Added
References (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 - (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-021-03 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-787
CPE cpe:2.3:a:honeywell:opc_ua_tunneller:*:*:*:*:*:*:*:*

26 Jan 2021, 20:59

Type Values Removed Values Added
New CVE

Information

Published : 2021-01-26 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-27297

Mitre link : CVE-2020-27297

CVE.ORG link : CVE-2020-27297


JSON object : View

Products Affected

honeywell

  • opc_ua_tunneller
CWE
CWE-787

Out-of-bounds Write

CWE-122

Heap-based Buffer Overflow