CVE-2021-38438
Published on: 10/18/2021 12:00:00 AM UTC
Last Modified on: 10/21/2021 08:24:00 PM UTC
Certain versions of Winproladder from Fatek contain the following vulnerability:
A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.
- CVE-2021-38438 has been assigned by
ics-[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
FATEK Automation - WinProladder version <= 3.30
Vulnerability Patch/Work Around
- FATEK Automation has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of these affected products are invited to contact FATEK customer support for additional information.
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
FATEK Automation WinProladder | CISA | us-cert.cisa.gov text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Fatek | Winproladder | All | All | All | All |
- cpe:2.3:a:fatek:winproladder:*:*:*:*:*:*:*:*:
Discovery Credit
xina1i and Natnael Samson (@NattiSamson), working with Trend Micro’s Zero Day Initiative, reported these vulnerabilities to CISA.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-38438 : A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exp… twitter.com/i/web/status/1… | 2021-10-18 13:10:45 |