Browse all 27 CVE security advisories affecting Softing. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Softing AG specializes in industrial communication solutions, providing hardware and software for connecting automation systems, particularly in automotive and manufacturing sectors. Its product portfolio includes gateways, switches, and software for protocols like CANopen and PROFINET, facilitating data exchange between field devices and higher-level control systems. Historically, the company’s software components have exhibited vulnerabilities such as remote code execution, buffer overflows, and improper access control, often stemming from complex network stack implementations. Notable incidents include critical flaws allowing unauthorized command execution or denial of service within industrial networks. These weaknesses highlight risks in legacy protocols and embedded systems where security updates may be delayed. The accumulation of twenty-seven CVEs underscores the challenges in maintaining secure codebases for specialized industrial IoT infrastructure, emphasizing the need for rigorous patch management and secure configuration practices in critical operational technology environments.
This page lists every published CVE security advisory associated with Softing. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.