AVEVA InTouch
A stack-based buffer overflow vulnerability exists in AVEVA InTouch HMI software when processing floating-point numbers from network requests. Systems running locales that use a comma (,) instead of a dot (.) as the decimal separator are vulnerable. An unauthenticated remote attacker can send a specially crafted network packet to the InTouch View service to trigger the overflow and execute arbitrary code with the privileges of the InTouch process. Affected versions include InTouch 2014 R2 SP1 and all 2017 versions prior to Update 2 with the corresponding hotfix applied.
- Network access to InTouch View service port
- System locale configured to not use dot (.) as floating point separator (e.g., European locales using comma)
- InTouch service running and accessible
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7af464a7-06a3-4ad2-903b-dc8da8944314Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.