CVE-2024-39354

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*

History

30 Jan 2025, 14:35

Type Values Removed Values Added
CPE cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*
CWE CWE-787
First Time Deltaww diascreen
Deltaww
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02 - US Government Resource
References () https://www.deltaww.com/en-US/Cybersecurity_Advisory - () https://www.deltaww.com/en-US/Cybersecurity_Advisory - Vendor Advisory

12 Nov 2024, 13:55

Type Values Removed Values Added
Summary
  • (es) Si un atacante engaña a un usuario válido para que ejecute Delta Electronics DIAScreen con un archivo que contiene código malicioso, se puede explotar un desbordamiento de búfer basado en pila en CEtherIPTagItem, lo que permite al atacante ejecutar de forma remota código arbitrario.

11 Nov 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-11 15:15

Updated : 2025-01-30 14:35


NVD link : CVE-2024-39354

Mitre link : CVE-2024-39354

CVE.ORG link : CVE-2024-39354


JSON object : View

Products Affected

deltaww

  • diascreen
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write