Discover the critical vulnerability (CVE-2022-1737) in Pyramid Solutions' EtherNet/IP Adapter Development Kit leading to an out-of-bounds write issue and learn how to mitigate the risk.
Pyramid Solutions' EtherNet/IP Adapter Development Kit (EADK) and EtherNet/IP Scanner Development Kit (EDKS) are vulnerable to an out-of-bounds write, potentially leading to a denial-of-service attack.
Understanding CVE-2022-1737
This CVE identifies a critical vulnerability in certain products developed by Pyramid Solutions.
What is CVE-2022-1737?
Pyramid Solutions' affected products, the Developer and DLL kits for EtherNet/IP Adapter and EtherNet/IP Scanner, are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to send a specially crafted packet that may result in a denial-of-service condition.
The Impact of CVE-2022-1737
The CVSS v3.1 base score for this vulnerability is 9.8, indicating a critical impact with high availability, confidentiality, and integrity impacts. An attacker can exploit this vulnerability over a network with low attack complexity, requiring no privileges.
Technical Details of CVE-2022-1737
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability involves an out-of-bounds write that can be triggered by a specially crafted packet, potentially leading to a denial-of-service scenario.
Affected Systems and Versions
The EtherNet/IP Adapter Development Kit (EADK) and EtherNet/IP Scanner Development Kit (EDKS) versions up to and including 4.4.0 are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability remotely through the network without requiring user interaction or privileges.
Mitigation and Prevention
To safeguard your systems, follow these key steps.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Make sure to install the latest patches released by Pyramid Solutions to fix the out-of-bounds write vulnerability in the affected kits.