First published: Tue Jul 09 2024(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CNCSoft by Delta Electronics | =2.0.0.5 |
Delta Electronics recommends users update to CNCSoft-G2 V2.1.0.10 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39883 is classified as a critical severity vulnerability due to the potential for remote code execution.
To fix CVE-2024-39883, update Delta Electronics CNCSoft-G2 to version 2.0.0.5 or apply the recommended security patches.
CVE-2024-39883 affects Delta Electronics CNCSoft-G2 version 2.0.0.5.
CVE-2024-39883 is a buffer overflow vulnerability that arises from inadequate input validation.
An attacker exploiting CVE-2024-39883 can execute arbitrary code in the context of the affected application.