First published: Tue Jun 11 2024(Updated: )
A heap-based buffer overflow vulnerability exists in the FOXMAN-UN/UNEM that if exploited will generally lead to a denial of service but can be used to execute arbitrary code, which is usually outside the scope of a program's implicit security policy
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Foxman Un | =r15a | |
Hitachi Energy Foxman Un | =r15b-pc4 | |
Hitachi Energy Foxman Un | =r16a | |
Hitachi Energy Foxman Un | =r16b-pc2 | |
Hitachi Energy Unem | =r15a | |
Hitachi Energy Unem | =r15b-pc4 | |
Hitachi Energy Unem | =r16a | |
Hitachi Energy Unem | =r16b-pc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2011 has a critical severity level, as it can lead to denial of service and potentially allow arbitrary code execution.
To fix CVE-2024-2011, update the affected Foxman-UN/UNEM software to the latest patched version provided by Hitachi Energy.
CVE-2024-2011 affects multiple versions including r15a, r15b-pc4, r16a, and r16b-pc2 of both Foxman-UN and Unem.
CVE-2024-2011 is classified as a heap-based buffer overflow vulnerability.
Exploiting CVE-2024-2011 could lead to denial of service and the execution of arbitrary code outside the program's security policy.