CVE-2024-31416

The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*

History

19 Sep 2024, 19:06

Type Values Removed Values Added
References () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf - () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf - Vendor Advisory
First Time Eaton
Eaton foreseer Electrical Power Monitoring System
CPE cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.6
v2 : unknown
v3 : 6.5
Summary
  • (es) El software Eaton Foreseer ofrece múltiples campos de entrada personalizables para que los usuarios configuren parámetros en la herramienta, como alarmas, informes, etc. Algunos de estos campos de entrada no verificaban la longitud y los límites del valor ingresado. Si un actor malintencionado aprovecha esta falla de seguridad, puede resultar en un consumo excesivo de memoria o un desbordamiento de números enteros.

13 Sep 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 17:15

Updated : 2024-09-19 19:06


NVD link : CVE-2024-31416

Mitre link : CVE-2024-31416

CVE.ORG link : CVE-2024-31416


JSON object : View

Products Affected

eaton

  • foreseer_electrical_power_monitoring_system
CWE
CWE-1284

Improper Validation of Specified Quantity in Input