9.8
CVSSv3

CVE-2015-8299

Published: 29/08/2017 Updated: 14/03/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the Group messages monitor (Falcon) in KNX ETS 4.1.5 (Build 3246) allows remote malicious users to execute arbitrary code via a crafted KNXnet/IP UDP packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

knx ets 4.1.5

Exploits

KNX management software ETS version 415 build 3246 suffers from a buffer overflow vulnerability that allows for remote code execution ...

Github Repositories

CVE-2015-8299 Advisory and PoC

knAx_20150101 Title: Remote code execution vulnerability in the KNX management software ETS Category/Abstract: Buffer overflow vulnerability Product: ETS (Engineering Tool Software) Affected versions: ETS 415 (Build 3246) no other versions tested Fixed in version: unknown Vendor: KNX Association Impact: Critical CVE number: CVE-2015-8299 Timeline 2013-10-11 identification