AUVESY Versiondog
AUVESY Versiondog versions earlier than 8.0 contain multiple critical vulnerabilities in input validation, memory management, privilege escalation, and file upload handling (CWE-284, CWE-732, CWE-321, CWE-125, CWE-416, CWE-787, CWE-123, CWE-119, CWE-434, CWE-73, CWE-15, CWE-20, CWE-400, CWE-427, CWE-294, CWE-89) that permit unauthenticated remote code execution and complete system compromise. Successful exploitation could allow an attacker to achieve remote code execution and acquire complete remote control over the Versiondog machine.
- Network reachability to Versiondog server port (HTTP/HTTPS or custom)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f17b16a8-cc21-4e16-bd3c-4ca02dea7ce9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.