First published: Wed Jun 12 2024(Updated: )
CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability exists that could allow a user with access to the device’s web interface to cause a fault on the device when sending a malformed HTTP request.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Schneider-electric Sage Rtu Firmware | <c3414-500-s02k5_p9 | |
Any of | ||
Schneider-electric Sage 1410 | ||
Schneider-electric Sage 1430 | ||
Schneider-electric Sage 1450 | ||
Schneider-electric Sage 2400 | ||
Schneider-electric Sage 3030 Magnum | ||
Schneider-electric Sage 4400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37040 is classified as a critical vulnerability due to its potential to cause device faults.
To mitigate CVE-2024-37040, it is recommended to restrict access to the device’s web interface and apply any available firmware updates.
CVE-2024-37040 affects the Schneider Electric Sage RTU firmware versions prior to c3414-500-s02k5_p9.
CVE-2024-37040 is a classic buffer overflow vulnerability that occurs due to improper size checks on input.
Exploitation of CVE-2024-37040 could allow an attacker to send a malformed HTTP request, causing a fault in the device.