First published: Thu Oct 10 2024(Updated: )
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CNCSoft by Delta Electronics | =2.1.0.10 |
Delta Electronics recommends users update to CNCSoft-G2 v2.1.0.16 https://downloadcenter.deltaww.com/en-US/DownloadCenter or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47962 is rated as a critical severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2024-47962, ensure you update Delta Electronics CNCSoft-G2 to version 2.1.0.10 or apply any available security patches.
CVE-2024-47962 specifically affects Delta Electronics CNCSoft-G2 version 2.1.0.10.
Yes, CVE-2024-47962 can be exploited remotely through social engineering to trick users into visiting a malicious page or file.
The potential impacts of CVE-2024-47962 include unauthorized code execution, which could lead to system compromise and data loss.