Eaton HMiSoft VU3
Eaton HMiSoft VU3 contains buffer overflow (CWE-121) and buffer over-read (CWE-125) vulnerabilities in versions 3.00.23 and earlier. Successful exploitation could crash the device and may allow remote code execution or information disclosure. The vulnerabilities are triggered through social engineering (opening untrusted files or clicking malicious links) and require local access—they are not remotely exploitable. Eaton discontinued HMiVU on December 31, 2018, marked it end-of-life, and no longer provides security fixes. The product has been replaced by the XV100 and XV300 operator interface lines.
- Local access to the device
- User interaction required (must open untrusted file or click malicious link)
- HMiSoft VU3 software version 3.00.23 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/686d1d21-174b-4b45-a05f-9e313129981cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.