Stack-based buffer overflow in CNCSoft-G2 - CVE-2024-4192
Published: May 2, 2024 / Updated: June 17, 2024
CNCSoft-G2
Delta Electronics, Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-121-01
- https://www.zerodayinitiative.com/advisories/ZDI-24-657/
- https://www.zerodayinitiative.com/advisories/ZDI-24-663/
- https://www.zerodayinitiative.com/advisories/ZDI-24-662/
- https://www.zerodayinitiative.com/advisories/ZDI-24-661/
- https://www.zerodayinitiative.com/advisories/ZDI-24-660/
- https://www.zerodayinitiative.com/advisories/ZDI-24-659/
- https://www.zerodayinitiative.com/advisories/ZDI-24-658/
- https://www.zerodayinitiative.com/advisories/ZDI-24-656/
- https://www.zerodayinitiative.com/advisories/ZDI-24-655/
- https://www.zerodayinitiative.com/advisories/ZDI-24-654/
- https://www.zerodayinitiative.com/advisories/ZDI-24-653/
- https://www.zerodayinitiative.com/advisories/ZDI-24-652/
- https://www.zerodayinitiative.com/advisories/ZDI-24-651/
- https://www.zerodayinitiative.com/advisories/ZDI-24-650/
- https://www.zerodayinitiative.com/advisories/ZDI-24-649/
- https://www.zerodayinitiative.com/advisories/ZDI-24-646/
- https://www.zerodayinitiative.com/advisories/ZDI-24-648/
- https://www.zerodayinitiative.com/advisories/ZDI-24-647/
- https://www.zerodayinitiative.com/advisories/ZDI-24-645/
- https://www.zerodayinitiative.com/advisories/ZDI-24-644/
- https://www.zerodayinitiative.com/advisories/ZDI-24-642/
- https://www.zerodayinitiative.com/advisories/ZDI-24-641/
- https://www.zerodayinitiative.com/advisories/ZDI-24-643/
- https://www.zerodayinitiative.com/advisories/ZDI-24-639/
- https://www.zerodayinitiative.com/advisories/ZDI-24-640/
- https://www.zerodayinitiative.com/advisories/ZDI-24-638/
- https://www.zerodayinitiative.com/advisories/ZDI-24-637/
- https://www.zerodayinitiative.com/advisories/ZDI-24-636/
- https://www.zerodayinitiative.com/advisories/ZDI-24-635/
- https://www.zerodayinitiative.com/advisories/ZDI-24-634/
- https://www.zerodayinitiative.com/advisories/ZDI-24-633/
- https://www.zerodayinitiative.com/advisories/ZDI-24-632/
- https://www.zerodayinitiative.com/advisories/ZDI-24-631/
- https://www.zerodayinitiative.com/advisories/ZDI-24-630/
- https://www.zerodayinitiative.com/advisories/ZDI-24-629/
- https://www.zerodayinitiative.com/advisories/ZDI-24-628/
- https://www.zerodayinitiative.com/advisories/ZDI-24-627/
- https://www.zerodayinitiative.com/advisories/ZDI-24-626/
- https://www.zerodayinitiative.com/advisories/ZDI-24-625/
- https://www.zerodayinitiative.com/advisories/ZDI-24-624/
- https://www.zerodayinitiative.com/advisories/ZDI-24-623/
- https://www.zerodayinitiative.com/advisories/ZDI-24-622/
- https://www.zerodayinitiative.com/advisories/ZDI-24-621/
- https://www.zerodayinitiative.com/advisories/ZDI-24-620/