CISA has published an advisory on a stack-based buffer overflow vulnerability in Fieldcomm Group HART-IP and hipserver. For HART-IP Developer kit, release 1.0.0.0 is affected. For hipserver, release 3.6.1 is affected. Successful exploitation of this vulnerability could crash the device being accessed; a buffer overflow condition may allow remote code execution. Fieldcomm Group recommends users restrict access to the computers or devices running the software. Users of hipserver should immediately upgrade source code to v3.7.0 or later. CISA also advised on a series of measures to mitigate the vulnerability. Read the advisory at CISA.
You are here
Related Resources
Jun 18, 2025 in Cybersecurity, in OT-ICS Security, in Security Preparedness
Jun 18, 2025 in Cybersecurity, in OT-ICS Security, in Federal & State Resources
Jun 12, 2025 in Cybersecurity, in Security Preparedness