Vulnerability Details CVE-2022-3385
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.3%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2022-3385
-
cpe:2.3:a:advantech:r-seenet:1.5.1
-
cpe:2.3:a:advantech:r-seenet:1.5.6
-
cpe:2.3:a:advantech:r-seenet:2.0.0
-
cpe:2.3:a:advantech:r-seenet:2.1.0
-
cpe:2.3:a:advantech:r-seenet:2.1.1
-
cpe:2.3:a:advantech:r-seenet:2.2.0
-
cpe:2.3:a:advantech:r-seenet:2.3.0
-
cpe:2.3:a:advantech:r-seenet:2.3.1
-
cpe:2.3:a:advantech:r-seenet:2.4.0
-
cpe:2.3:a:advantech:r-seenet:2.4.1
-
cpe:2.3:a:advantech:r-seenet:2.4.10
-
cpe:2.3:a:advantech:r-seenet:2.4.11
-
cpe:2.3:a:advantech:r-seenet:2.4.12
-
cpe:2.3:a:advantech:r-seenet:2.4.13
-
cpe:2.3:a:advantech:r-seenet:2.4.14
-
cpe:2.3:a:advantech:r-seenet:2.4.15
-
cpe:2.3:a:advantech:r-seenet:2.4.17
-
cpe:2.3:a:advantech:r-seenet:2.4.2
-
cpe:2.3:a:advantech:r-seenet:2.4.3
-
cpe:2.3:a:advantech:r-seenet:2.4.4
-
cpe:2.3:a:advantech:r-seenet:2.4.6
-
cpe:2.3:a:advantech:r-seenet:2.4.7
-
cpe:2.3:a:advantech:r-seenet:2.4.8
-
cpe:2.3:a:advantech:r-seenet:2.4.9