CVE-2024-39354

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*

History

30 Jan 2025, 14:35

Type Values Removed Values Added
CWE CWE-787
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - US Government Resource
References () https://www.deltaww.com/en-US/Cybersecurity_Advisory - () https://www.deltaww.com/en-US/Cybersecurity_Advisory - Vendor Advisory
CPE cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*
First Time Deltaww diascreen
Deltaww

Information

Published : 2024-11-11 15:15

Updated : 2025-01-30 14:35


NVD link : CVE-2024-39354

Mitre link : CVE-2024-39354

CVE.ORG link : CVE-2024-39354


JSON object : View

Products Affected

deltaww

  • diascreen
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write