Critical Vulnerability Information 1. Vulnerability Overview Product: Fuji Electric Smart Editor Release Date: June 17, 2023 Alert Code: ICSA-23-168-01 Related CVEs: CVE-2023-41425, CVE-2023-41426, CVE-2023-41427, CVE-2023-41428, CVE-2023-41429, CVE-2023-41430, CVE-2023-41431, CVE-2023-41432, CVE-2023-41433, CVE-2023-41434, CVE-2023-41435, CVE-2023-41436, CVE-2023-41437, CVE-2023-41438, CVE-2023-41439 2. Affected Products Smart Editor: Versions 1.0.1.0 and earlier 3. Vulnerability Details CWE Types: - CWE-125: Out-of-bounds Read - CWE-787: Out-of-bounds Write - CWE-121: Stack-based Buffer Overflow CVSS Score: - Multiple CVEs have a CVSS v3.1 score of 8.4, classified as High severity. 4. Risk Assessment Successful exploitation of these vulnerabilities could allow attackers to execute arbitrary code. 5. Mitigation Measures Fuji Electric recommends users upgrade to Smart Editor v1.0.2.0 or later. CISA advises implementing defensive measures such as minimizing network exposure and controlling access to network and devices. 6. Background Critical Infrastructure Sector: Wholesale Manufacturing Deployment Countries/Regions: Global Company Headquarters Location: Japan 7. Researchers Kimiya, in collaboration with Trend Micro Zero Day Initiative, reported these vulnerabilities to CISA.