FATEK Automation WinProladder
FATEK WinProladder versions 3.30_24518 and earlier contain buffer overflow vulnerabilities (CWE-787, CWE-121) that could allow arbitrary code execution if a user opens a malicious file or clicks a malicious link. Successful exploitation could allow an attacker to run code on the engineering workstation with the same privileges as the user, potentially leading to modification of PLC programs, theft of engineering data, or compromise of plant control logic before deployment to field devices. FATEK Automation has not responded to CISA requests and has not provided a patch. No public exploits are currently known, and these vulnerabilities are not remotely exploitable.
- User interaction required: victim must click a malicious link or open an unsolicited attachment
- WinProladder must be installed and running on the engineering workstation
- Local or physical access to the workstation, or ability to deliver a malicious file via email or web
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a15c3f9a-263d-45a2-a21b-5c4b7660d61eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.