← Back to CVEs
CVE-2024-24963
CRITICAL9.8
Description
A stack-based buffer overflow vulnerability exists in the Programming Software Connection FileSelect functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to stack-based buffer overflow. An attacker can send an unauthenticated packet to trigger this vulnerability.This CVE tracks the stack-based buffer overflow that occurs at offset `0xb6e84` of v1.2.10.9 of the P3-550E firmware.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/28/2024
Last Modified2/12/2025
Sourcenvd
Honeypot Sightings0
Affected Products
automationdirect:p1-540automationdirect:p1-540_firmwareautomationdirect:p1-550automationdirect:p1-550_firmwareautomationdirect:p2-550automationdirect:p2-550_firmwareautomationdirect:p3-530automationdirect:p3-530_firmwareautomationdirect:p3-550automationdirect:p3-550_firmwareautomationdirect:p3-550eautomationdirect:p3-550e_firmware
Weaknesses (CWE)
CWE-121CWE-787
References
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939(talos-cna@cisco.com)
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939(talos-cna@cisco.com)
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1939(af854a3a-2127-422b-91ae-364da2661108)
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1939(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.