CVE-2021-38432
Published on: 10/15/2021 12:00:00 AM UTC
Last Modified on: 10/20/2021 08:08:00 PM UTC
Certain versions of Communication Server from Fatek contain the following vulnerability:
FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.
- CVE-2021-38432 has been assigned by
ics-[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
FATEK Automation - Communication Server version <= 1.13
Vulnerability Patch/Work Around
- FATEK Automation has not responded to requests to work with CISA to mitigate this vulnerability. Users of these affected products are invited to contact FATEK customer support for additional information.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.5 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
FATEK Automation Communication Server | CISA | us-cert.cisa.gov text/html |
![]() |
Related QID Numbers
- 590594 FATEK Automation Communication Server Stack based Buffer Overflow Vulnerability (ICSA-21-280-07)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Fatek | Communication Server | - | All | All | All |
Operating System | Fatek | Communication Server Firmware | All | All | All | All |
- cpe:2.3:h:fatek:communication_server:-:*:*:*:*:*:*:*:
- cpe:2.3:o:fatek:communication_server_firmware:*:*:*:*:*:*:*:*:
Discovery Credit
Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported this vulnerability to CISA.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-38432 : FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supp… twitter.com/i/web/status/1… | 2021-10-15 15:02:48 |