Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Opc_ua_tunneller
(Honeywell)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-01-26 | CVE-2020-27297 | The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to manipulate memory with controlled values and remotely execute code on the OPC UA Tunneller (versions prior to 6.3.0.8233). | Opc_ua_tunneller | 9.8 | ||
2021-01-26 | CVE-2020-27299 | The affected product is vulnerable to an out-of-bounds read, which may allow an attacker to obtain and disclose sensitive data information or cause the device to crash on the OPC UA Tunneller (versions prior to 6.3.0.8233). | Opc_ua_tunneller | 9.1 | ||
2021-01-26 | CVE-2020-27274 | Some parsing functions in the affected product do not check the return value of malloc and the thread handling the message is forced to close, which may lead to a denial-of-service condition on the OPC UA Tunneller (versions prior to 6.3.0.8233). | Opc_ua_tunneller | 7.5 | ||
2021-01-26 | CVE-2020-27295 | The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition on the OPC UA Tunneller (versions prior to 6.3.0.8233). | Opc_ua_tunneller | 7.5 |