Cscape Catastrophe: Horner Automation’s Code-Reading Blunder Raises CVSS to 8.4!
Attention all Cscape users! Your automation software might be feeling a bit too adventurous with its reading habits, and not in a good way. An out-of-bounds read vulnerability could let attackers snoop on your secrets and hijack your system. Time to update and show those cyber intruders the exit door! Stay safe, stay updated. View CSAF for more.

Hot Take:
Who knew a simple ‘out-of-bounds read’ could lead to such a global game of cybersecurity cat and mouse? It’s like leaving your house keys under the mat with a neon sign pointing to them—only this time, the house controls critical infrastructure! Horner Automation might want to rethink their welcome mat strategy.
Key Points:
- Horner Automation’s Cscape version 10.0 SP1 is vulnerable to an out-of-bounds read.
- The vulnerability allows attackers to disclose information and execute arbitrary code.
- This affects critical manufacturing sectors worldwide.
- A CVSS v4 score of 8.4 highlights the severity of the issue.
- Mitigation involves updating to Cscape version 10.1 SP1 and implementing network security measures.
Already a member? Log in here