First published: Tue Jul 09 2024(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CNCSoft by Delta Electronics | =2.0.0.5 |
Delta Electronics recommends users update to CNCSoft-G2 V2.1.0.10 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39882 is classified as a high severity vulnerability due to its potential for code execution.
To fix CVE-2024-39882, update Delta Electronics CNCSoft-G2 to the latest version that includes the necessary security patches.
CVE-2024-39882 affects Delta Electronics CNCSoft-G2 version 2.0.0.5.
CVE-2024-39882 allows attackers to execute arbitrary code by leveraging user input vulnerabilities.
Currently, there are no known workarounds for CVE-2024-39882, and users are advised to apply the updated software as soon as possible.