CVE-2021-38436
Published on: 10/18/2021 12:00:00 AM UTC
Last Modified on: 10/25/2022 03:28:00 PM UTC
Certain versions of Winproladder from Fatek contain the following vulnerability:
FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
- CVE-2021-38436 has been assigned by
ics-[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
FATEK Automation - WinProladder version <= 3.30
Vulnerability Patch/Work Around
- FATEK Automation has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact FATEK customer support for additional information.
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
FATEK Automation WinProladder | CISA | us-cert.cisa.gov text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file i…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Fatek | Winproladder | All | All | All | All |
- cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*:
Discovery Credit
xina1i and Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-38436 : FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied dat… twitter.com/i/web/status/1… | 2021-10-18 13:10:19 |