A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions <IP8SR4),CerberusPROENX200CloudDistributionIP7(Allversions),CerberusPROENX200CloudDistributionIP8(Allversions<V4.3.5618),CerberusPROENX300CloudDistributionIP7(Allversions),CerberusPROENX300CloudDistributionIP8(Allversions<V4.3.5617),CerberusPROULCompactPanelFC922/924(Allversions<MP4),CerberusPROULEngineeringTool(Allversions<MP4),CerberusPROULX300CloudDistribution(Allversions<V4.3.0001),DesigoFireSafetyULCompactPanelFC2025/2050(Allversions<MP4),DesigoFireSafetyULEngineeringTool(Allversions<MP4),DesigoFireSafetyULX300CloudDistribution(Allversions<V4.3.0001),SintesoFS20ENEngineeringTool(Allversions),SintesoFS20ENFirePanelFC20MP6(Allversions),SintesoFS20ENFirePanelFC20MP7(Allversions),SintesoFS20ENFirePanelFC20MP8(Allversions<MP8SR4),SintesoFS20ENX200CloudDistributionMP7(Allversions),SintesoFS20ENX200CloudDistributionMP8(Allversions<V4.3.5618),SintesoFS20ENX300CloudDistributionMP7(Allversions),SintesoFS20ENX300CloudDistributionMP8(Allversions<V4.3.5617),SintesoMobile(Allversions).ThenetworkcommunicationlibraryinaffectedsystemsimproperlyhandlesmemorybufferswhenparsingX.509certificates.
This could allow an unauthenticated remote attacker to crash the network service.