Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 03 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hirschmann Industrial HiVision versions 08.1.03 prior to 08.1.04 and 08.2.00 contains an untrusted search path vulnerability that allows local attackers to execute arbitrary binaries by placing a malicious binary in the path of a configured external application. Attackers can exploit insufficient path sanitization to cause the execution of a malicious binary instead of the intended application, potentially resulting in execution with elevated privileges. | Hirschmann HiOS devices versions prior to 08.1.00 and 07.1.01 contain a denial of service vulnerability in the EtherNet/IP stack where improper handling of packet length fields allows remote attackers to crash or hang the device. Attackers can send specially crafted UDP EtherNet/IP packets with a length value larger than the actual packet size to render the device inoperable. |
| Title | Hirschmann Industrial HiVision Untrusted Search Path Arbitrary Binary Execution | Hirschmann HiOS EtherNet/IP Stack Denial of Service |
| Weaknesses | CWE-426 | CWE-20 |
| References | ||
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hirschmann Industrial HiVision versions 08.1.03 prior to 08.1.04 and 08.2.00 contains an untrusted search path vulnerability that allows local attackers to execute arbitrary binaries by placing a malicious binary in the path of a configured external application. Attackers can exploit insufficient path sanitization to cause the execution of a malicious binary instead of the intended application, potentially resulting in execution with elevated privileges. | |
| Title | Hirschmann Industrial HiVision Untrusted Search Path Arbitrary Binary Execution | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-03T20:47:47.596Z
Reserved: 2026-04-03T15:51:05.544Z
Link: CVE-2020-37216
No data.
Status : Received
Published: 2026-04-03T21:17:08.213
Modified: 2026-04-03T21:17:08.213
Link: CVE-2020-37216
No data.
OpenCVE Enrichment
No data.