First published: Tue Apr 30 2024(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Delta Electronics CNCSoft-G2 | ||
DOPSoft |
Delta Electronics recommends users update to CNCSoft-G2 v2.1.0.4 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4192 has a critical severity level as it allows attackers to execute code within the context of the vulnerable process.
The recommended fix for CVE-2024-4192 is to update Delta Electronics CNCSoft-G2 and DOPSoft to the latest patched versions.
CVE-2024-4192 is a buffer overflow vulnerability due to improper length validation of user-supplied data.
CVE-2024-4192 affects users of Delta Electronics CNCSoft-G2 and DOPSoft software.
An attacker exploiting CVE-2024-4192 could execute arbitrary code, potentially leading to unauthorized access or control over the affected system.