CVE-2022-41989

Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 does not validate the length of RTLS report payloads during communication. This allows an attacker to send an exceedingly long payload, resulting in an out-of-bounds write to cause a denial-of-service condition or code execution.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 Third Party Advisory US Government Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:sewio:real-time_location_system_studio:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
References () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 - Third Party Advisory, US Government Resource () https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-01 - Third Party Advisory, US Government Resource
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 9.0
Summary
  • (es) Real-Time Location System (RTLS) Studio de Sewio, versión 2.0.0 hasta la versión 2.6.2 incluida, no valida la longitud de los payloads del informe RTLS durante la comunicación. Esto permite a un atacante enviar un payload excesivamente larga, lo que da como resultado una escritura fuera de los límites que provoca una condición de denegación de servicio o la ejecución de código.

Information

Published : 2023-01-18 01:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41989

Mitre link : CVE-2022-41989

CVE.ORG link : CVE-2022-41989


JSON object : View

Products Affected

sewio

  • real-time_location_system_studio
CWE
CWE-787

Out-of-bounds Write