

Rewterz Threat Advisory – CVE-2019-16928 – Exim string_vformat function buffer overflow Vulnerability
October 1, 2019
Rewterz Threat ALert – FakeUpdates are Back! – IOC’s
October 2, 2019
Rewterz Threat Advisory – CVE-2019-16928 – Exim string_vformat function buffer overflow Vulnerability
October 1, 2019
Rewterz Threat ALert – FakeUpdates are Back! – IOC’s
October 2, 2019Severity
High
Analysis Summary
Service paths in some Yokogawa applications are unquoted and contain spaces. This may allow a local attacker to execute malicious files by the service privilege.
Impact
Unquoted Search Path or Element
Affected Vendors
Yokogawa
Affected Products
Exaopc
Exaplog
Exaquantum
Exasmoc
Exarqe
GA10
InsightSuiteAE
Remediation
Please see vendor’s advisory for the list of patches available for products.