{"api_version":"1","generated_at":"2026-05-06T14:49:49+00:00","cve":"CVE-2010-2974","urls":{"html":"https://cve.report/CVE-2010-2974","api":"https://cve.report/api/cve/CVE-2010-2974.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2010-2974","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2010-2974"},"summary":{"title":"CVE-2010-2974","description":"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.","state":"PUBLISHED","assigner":"mitre","published_at":"2010-08-05 19:17:55","updated_at":"2026-04-29 01:13:23"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.kb.cert.org/vuls/id/703189","name":"http://www.kb.cert.org/vuls/id/703189","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"VU#703189 - Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control stack buffer overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/MORO-87MHPT","name":"http://www.kb.cert.org/vuls/id/MORO-87MHPT","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Invensys  Information for VU#703189","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm","name":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108","name":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2010-2974","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2974","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2010","cve_id":"2974","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"infusion_integrated_engineering_environment","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"3.1","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"3.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_application_server","cpe6":"*","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_archestra_configuration_access_component_activex_control","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2010","cve_id":"2974","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invensys","cpe5":"wonderware_archestra_integrated_development_environment","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T02:55:45.509Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"VU#703189","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/703189"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/MORO-87MHPT"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"descriptions":[{"lang":"en","value":"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2010-08-05T19:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"VU#703189","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/703189"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"},{"tags":["x_refsource_CONFIRM"],"url":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kb.cert.org/vuls/id/MORO-87MHPT"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2010-2974","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"VU#703189","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/703189"},{"name":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108","refsource":"CONFIRM","url":"http://www.pacwest.wonderware.com/web/News/NewsDetails.aspx?NewsID=203108"},{"name":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm","refsource":"CONFIRM","url":"https://wdnresource.wonderware.com/support/kbcd/html/1/t002492.htm"},{"name":"http://www.kb.cert.org/vuls/id/MORO-87MHPT","refsource":"CONFIRM","url":"http://www.kb.cert.org/vuls/id/MORO-87MHPT"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2010-2974","datePublished":"2010-08-05T19:00:00.000Z","dateReserved":"2010-08-05T00:00:00.000Z","dateUpdated":"2024-09-17T03:43:16.392Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2010-08-05 19:17:55","lastModifiedDate":"2026-04-29 01:13:23","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_archestra_configuration_access_component_activex_control:*:*:*:*:*:*:*:*","matchCriteriaId":"B08B61E8-62EF-46B0-8881-300A02E911F5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:invensys:infusion_integrated_engineering_environment:*:*:*:*:*:*:*:*","matchCriteriaId":"9294B6B1-7D7C-461B-ADC1-D90251FADB96"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:*:sp2:*:*:*:*:*:*","versionEndIncluding":"3.1","matchCriteriaId":"C53D322C-1D42-479E-9225-40684655F4CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"68FA27FB-6AA3-4E6F-83EB-066DAF0BD3A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:2.1:*:*:*:*:*:*:*","matchCriteriaId":"2B64216A-3D05-4384-8B35-845974B99128"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"B5EA5956-AFFF-4AF6-8E51-60B702E4E3FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CA9909E3-C0C3-4EE8-A592-948D8F90E569"},{"vulnerable":true,"criteria":"cpe:2.3:a:invensys:wonderware_application_server:3.1:sp1:*:*:*:*:*:*","matchCriteriaId":"2576F8F1-DA43-47E1-95D9-9A9233FCD2B0"},{"vulnerable":false,"criteria":"cpe:2.3:a:invensys:wonderware_archestra_integrated_development_environment:*:*:*:*:*:*:*:*","matchCriteriaId":"7C0CE9E0-61A4-4D92-BB3F-4437E77E27CE"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2010","CveId":"2974","Ordinal":"1","Title":"CVE-2010-2974","CVE":"CVE-2010-2974","Year":"2010"},"notes":[{"CveYear":"2010","CveId":"2974","Ordinal":"1","NoteData":"Stack-based buffer overflow in the IConfigurationAccess interface in the Invensys Wonderware Archestra ConfigurationAccessComponent ActiveX control in Wonderware Application Server (WAS) before 3.1 SP2 P01, as used in the Wonderware Archestra Integrated Development Environment (IDE) and the InFusion Integrated Engineering Environment (IEE), allows remote attackers to execute arbitrary code via the first argument to the UnsubscribeData method.","Type":"Description","Title":"CVE-2010-2974"},{"CveYear":"2010","CveId":"2974","Ordinal":"2","NoteData":"2010-08-05","Type":"Other","Title":"Published"}]}}}