hornerautomation CVE Vulnerabilities & Metrics

Focus on hornerautomation vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About hornerautomation Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with hornerautomation. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total hornerautomation CVEs: 35
Earliest CVE date: 20 Dec 2018, 21:29 UTC
Latest CVE date: 15 Jan 2024, 23:15 UTC

Latest CVE reference: CVE-2023-7206

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical hornerautomation CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.82

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 20
4.0-6.9 15
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS hornerautomation CVEs

These are the five CVEs with the highest CVSS scores for hornerautomation, sorted by severity first and recency.

All CVEs for hornerautomation

CVE-2023-7206 hornerautomation vulnerability CVSS: 0 15 Jan 2024, 23:15 UTC

In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape.

Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e374b. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.

The affected product does not properly validate user-supplied data. If a user opens a maliciously formed CSP file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer.

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to a use-after-free vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

The affected application lacks proper validation of user-supplied data when parsing font files (e.g., FNT). This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.

Horner Automation Cscape lacks proper validation of user-supplied data when parsing project files (e.g., HMI). This could lead to an out-of-bounds write at CScape_EnvisionRV+0x2e3c04. An attacker could leverage this vulnerability to potentially execute arbitrary code in the context of the current process.

The affected application lacks proper validation of user-supplied data when parsing project files (e.g.., CSP). This could lead to an out-of-bounds read in IO_CFG. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in the FontManager. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

The affected application lacks proper validation of user-supplied data when parsing project files (e.g., CSP). This could lead to an out-of-bounds read in Cscape!CANPortMigration. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2023-0623 hornerautomation vulnerability CVSS: 0 09 Mar 2023, 22:15 UTC

Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.

CVE-2023-0622 hornerautomation vulnerability CVSS: 0 09 Mar 2023, 22:15 UTC

Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.

CVE-2023-0621 hornerautomation vulnerability CVSS: 0 09 Mar 2023, 22:15 UTC

Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds read vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in reads past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.

CVE-2022-2642 hornerautomation vulnerability CVSS: 0 02 Dec 2022, 20:15 UTC

Horner Automation’s RCC 972 firmware version 15.40 contains global variables. This could allow an attacker to read out sensitive values and variable keys from the device.

CVE-2022-2641 hornerautomation vulnerability CVSS: 0 02 Dec 2022, 20:15 UTC

Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition.

CVE-2022-2640 hornerautomation vulnerability CVSS: 0 02 Dec 2022, 20:15 UTC

The Config-files of Horner Automation’s RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP).

CVE-2022-3377 hornerautomation vulnerability CVSS: 0 15 Nov 2022, 21:15 UTC

Horner Automation's Cscape version 9.90 SP 6 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory read.

CVE-2022-3379 hornerautomation vulnerability CVSS: 0 27 Oct 2022, 23:15 UTC

Horner Automation's Cscape version 9.90 SP7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by writing outside the memory buffer.

CVE-2022-3378 hornerautomation vulnerability CVSS: 0 27 Oct 2022, 23:15 UTC

Horner Automation's Cscape version 9.90 SP 7 and prior does not properly validate user-supplied data. If a user opens a maliciously formed FNT file, then an attacker could execute arbitrary code within the current process by accessing an uninitialized pointer, leading to an out-of-bounds memory write.

CVE-2022-30540 hornerautomation vulnerability CVSS: 6.8 02 Jun 2022, 14:15 UTC

The affected product is vulnerable to a heap-based buffer overflow via uninitialized pointer, which may allow an attacker to execute arbitrary code

CVE-2022-29488 hornerautomation vulnerability CVSS: 6.8 02 Jun 2022, 14:15 UTC

The affected product is vulnerable to an out-of-bounds read via uninitialized pointer, which may allow an attacker to execute arbitrary code.

CVE-2022-28690 hornerautomation vulnerability CVSS: 6.8 02 Jun 2022, 14:15 UTC

The affected product is vulnerable to an out-of-bounds write via uninitialized pointer, which may allow an attacker to execute arbitrary code.

CVE-2022-27184 hornerautomation vulnerability CVSS: 6.8 02 Jun 2022, 14:15 UTC

The affected product is vulnerable to an out-of-bounds write, which may allow an attacker to execute arbitrary code.

CVE-2021-44462 hornerautomation vulnerability CVSS: 5.8 25 Mar 2022, 19:15 UTC

This vulnerability can be exploited by parsing maliciously crafted project files with Horner Automation Cscape EnvisionRV v4.50.3.1 and prior. The issues result from the lack of proper validation of user-supplied data, which can result in reads and writes past the end of allocated data structures. User interaction is required to exploit this vulnerability as an attacker must trick a valid user to open a malicious HMI project file.

CVE-2021-33015 hornerautomation vulnerability CVSS: 6.8 25 Aug 2021, 19:15 UTC

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write via an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2021-32995 hornerautomation vulnerability CVSS: 6.8 25 Aug 2021, 19:15 UTC

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2021-32975 hornerautomation vulnerability CVSS: 6.8 25 Aug 2021, 19:15 UTC

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2021-22682 hornerautomation vulnerability CVSS: 4.6 23 Apr 2021, 18:15 UTC

Cscape (All versions prior to 9.90 SP4) is configured by default to be installed for all users, which allows full permissions, including read/write access. This may allow unprivileged users to modify the binaries and configuration files and lead to local privilege escalation.

CVE-2021-22678 hornerautomation vulnerability CVSS: 6.8 23 Apr 2021, 18:15 UTC

Cscape (All versions prior to 9.90 SP4) lacks proper validation of user-supplied data when parsing project files. This could lead to memory corruption. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2021-22663 hornerautomation vulnerability CVSS: 6.8 09 Feb 2021, 17:15 UTC

Cscape (All versions prior to 9.90 SP3.5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVE-2019-13545 hornerautomation vulnerability CVSS: 6.8 18 Oct 2019, 19:15 UTC

In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.

CVE-2019-13541 hornerautomation vulnerability CVSS: 6.8 18 Oct 2019, 19:15 UTC

In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.

CVE-2019-6555 hornerautomation vulnerability CVSS: 6.8 28 Feb 2019, 20:29 UTC

Cscape, 9.80 SP4 and prior. An improper input validation vulnerability may be exploited by processing specially crafted POC files. This may allow an attacker to read confidential information and remotely execute arbitrary code.

CVE-2018-19005 hornerautomation vulnerability CVSS: 6.8 20 Dec 2018, 21:29 UTC

Cscape, Version 9.80.75.3 SP3 and prior. An improper input validation vulnerability has been identified that may be exploited by processing specially crafted POC files lacking user input validation. This may allow an attacker to read confidential information and remotely execute arbitrary code.