The NCCIC has released an advisory on a stack-based buffer overflow vulnerability in Opto22 PAC Control Basic and PAC Control Professional. PAC Control Basic versions R10.0a and prior and PAC Control Professional Versions R10.0a and prior are affected. Successful exploitation of this vulnerability could crash the device being accessed, and a buffer overflow condition may then allow remote code execution. Opto22 recommends users upgrade to the newest version. The NCCIC also recommends a series of defensive measures to minimize the risk of exploitation of these vulnerabilities. NCCIC/ICS-CERT.
You are here
Related Resources
Mar 13, 2025 in Cybersecurity, in Federal & State Resources, in Security Preparedness
(TLP:CLEAR) Dragos Case Study of Volt Typhoon’s Breach of a Massachusetts Electric and Water Utility
Mar 13, 2025 in Cybersecurity, in OT-ICS Security, in Security Preparedness
Mar 13, 2025 in Cybersecurity, in OT-ICS Security, in Security Preparedness