TL;DR

A remote code execution flaw exists in AzeoTech DAQFactory Pro due to improper handling of CTL files, allowing attackers to execute arbitrary code on vulnerable systems with user interaction.

What happened

['Remote attackers can exploit a vulnerability in AzeoTech DAQFactory Pro', 'CTL file parsing leads to out-of-bounds read']

Why it matters for ops

['Exploitation requires user interaction', 'Attackers may execute arbitrary code remotely', 'CVSS rating of 7.8 indicates high severity']

Mitigation

  • Update to the latest version
  • Disable unnecessary services and ports

Action items

  • Review system configurations for AzeoTech DAQFactory Pro
  • Implement patches or updates provided by vendor

Detection IOCs

  • Unexpected CTL file parsing behavior
  • Unusual network traffic from affected systems

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-058/