A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: siemens
Published: 2023-02-14T10:36:24.707Z
Updated: 2025-03-20T16:14:10.708Z
Reserved: 2023-01-24T13:52:15.873Z
Link: CVE-2023-24482

Updated: 2024-08-02T10:56:04.164Z

Status : Modified
Published: 2023-02-14T11:15:14.783
Modified: 2024-11-21T07:47:56.933
Link: CVE-2023-24482

No data.