First published: Thu Feb 27 2025(Updated: )
Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.
Credit: prodsec@nozominetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
libmodbus |
To fix this issue, it's suggested to update libmodbus to v3.1.11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10918 has a high severity rating due to its potential to cause a stack-based buffer overflow.
To fix CVE-2024-10918, update libmodbus to the latest version that addresses this vulnerability.
CVE-2024-10918 affects all installations of libmodbus v3.1.10.
CVE-2024-10918 can enable attackers to execute arbitrary code or crash the application due to the buffer overflow.
If patching isn't possible for CVE-2024-10918, limiting access to the Modbus interface may help mitigate the risk.