The Eaton Foreseer software provides multiple customizable input fields for the users to configure parameters in the tool like alarms, reports, etc. Some of these input fields were not checking the length and bounds of the entered value. The exploit of this security flaw by a bad actor may result in excessive memory consumption or integer overflow.
References
Link | Resource |
---|---|
https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf | Vendor Advisory |
Configurations
History
19 Sep 2024, 19:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/etn-va-2024-1008.pdf - Vendor Advisory | |
First Time |
Eaton
Eaton foreseer Electrical Power Monitoring System |
|
CPE | cpe:2.3:a:eaton:foreseer_electrical_power_monitoring_system:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Summary |
|
13 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 17:15
Updated : 2024-09-19 19:06
NVD link : CVE-2024-31416
Mitre link : CVE-2024-31416
CVE.ORG link : CVE-2024-31416
JSON object : View
Products Affected
eaton
- foreseer_electrical_power_monitoring_system
CWE
CWE-1284
Improper Validation of Specified Quantity in Input