CVE-2024-47131

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*

History

30 Jan 2025, 14:35

Type Values Removed Values Added
CPE cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*
First Time Deltaww diascreen
Deltaww
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - US Government Resource
References () https://www.deltaww.com/en-US/Cybersecurity_Advisory - () https://www.deltaww.com/en-US/Cybersecurity_Advisory - Vendor Advisory
CWE CWE-787

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) Si un atacante engaña a un usuario válido para que ejecute Delta Electronics DIAScreen con un archivo que contiene código malicioso, se puede explotar un desbordamiento de búfer basado en pila en BACnetObjectInfo, lo que permite al atacante ejecutar de forma remota código arbitrario.

11 Nov 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-11 15:15

Updated : 2025-01-30 14:35


NVD link : CVE-2024-47131

Mitre link : CVE-2024-47131

CVE.ORG link : CVE-2024-47131


JSON object : View

Products Affected

deltaww

  • diascreen
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write