A directory path traversal vulnerability exists when loading a vsmodel file in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .vsmodel file. This vulnerability affects VeriStand 2024 Q2 and prior versions.
References
Configurations
Configuration 1 (hide)
|
History
17 Sep 2024, 14:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ni:veristand:2024:q2:*:*:*:*:*:* cpe:2.3:a:ni:veristand:*:*:*:*:*:*:*:* |
|
References | () https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/directory-path-traversal-vulnerability-in-ni-veristand-with-vsmodel-files.html - Vendor Advisory | |
First Time |
Ni veristand
Ni |
24 Jul 2024, 12:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-22 21:15
Updated : 2024-09-17 14:44
NVD link : CVE-2024-6791
Mitre link : CVE-2024-6791
CVE.ORG link : CVE-2024-6791
JSON object : View
Products Affected
ni
- veristand
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')