First published: Tue Jul 30 2024(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of NI VeriStand. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-6805.
Affected Software | Affected Version | How to fix |
---|---|---|
NI VeriStand |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1024 is rated at 7.5, indicating a high level of risk.
To fix ZDI-24-1024, apply the latest security patch provided by NI for VeriStand.
Yes, ZDI-24-1024 can be exploited remotely without the need for authentication.
The potential consequence of ZDI-24-1024 is a denial-of-service condition on affected NI VeriStand installations.
Yes, the CVE associated with ZDI-24-1024 is CVE-2024-6805.