First published: Tue Jul 09 2024(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CNCSoft by Delta Electronics | =2.0.0.5 |
Delta Electronics recommends users update to CNCSoft-G2 V2.1.0.10 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39880 has been rated as a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2024-39880, update to the latest version of Delta Electronics CNCSoft-G2 where the buffer validation issues have been addressed.
CVE-2024-39880 can be exploited through malicious web pages or files that a user is tricked into opening.
CVE-2024-39880 specifically affects Delta Electronics CNCSoft-G2 version 2.0.0.5.
Exploitation of CVE-2024-39880 could allow an attacker to execute arbitrary code in the context of the affected application.