GP-Pro EX Log Parsing Buffer Overflow
CVE-2023-3953 Published on August 9, 2023
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause memory corruption when an authenticated user opens a tampered log file from GP-Pro EX.
Vulnerability Analysis
CVE-2023-3953 can be exploited with local system access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.
Weakness Type
What is a Buffer Overflow Vulnerability?
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
CVE-2023-3953 has been classified to as a Buffer Overflow vulnerability or weakness.
Products Associated with CVE-2023-3953
Want to know whenever a new CVE is published for Schneider Electric Pro Face Gp Pro Ex? stack.watch will email you.
Affected Versions
Schneider Electric GP-Pro EX WinGP for iPC:- Version v4.09.450 and prior is affected.
- Version v4.09.450 and prior is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.