WECON LeviStudioU
A stack buffer overflow vulnerability (CWE-121) in WECON LeviStudioU versions 2019-09-21 and earlier allows arbitrary code execution through a malicious project file. The vulnerability requires user interaction—an operator must open a crafted project file in LeviStudioU for the overflow to trigger. WECON has not responded to CISA requests to develop a fix. The vulnerability is not remotely exploitable; an attacker must deliver the malicious file locally or via social engineering (email, file sharing). Exploitation could allow an attacker to run code on the engineering workstation with user privileges, potentially modifying control system logic or stealing configuration data.
- Local or network file system access to deliver the malicious project file
- User interaction required: operator must open the malicious project file in LeviStudioU
- LeviStudioU must be installed and running on the target workstation
- LeviStudioU version 2019-09-21 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3384abe6-e572-4b64-91ac-64ee9754fb5eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.