CVE-2024-31484

A vulnerability has been identified in CPC80 Central Processing/Communication (All versions < V16.41), CPCI85 Central Processing/Communication (All versions < V5.30), CPCX26 Central Processing/Communication (All versions < V06.02), ETA4 Ethernet Interface IEC60870-5-104 (All versions < V10.46), ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 (All versions < V03.27), PCCX26 Ax 1703 PE, Contr, Communication Element (All versions < V06.05). The affected devices contain an improper null termination vulnerability while parsing a specific HTTP header. This could allow an attacker to execute code in the context of the current process or lead to denial of service condition.
Configurations

No configuration.

History

04 Jul 2024, 07:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/4 -

11 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-620338.html -
Summary
  • (es) Se ha identificado una vulnerabilidad en CPC80 Central Processing/Communication (todas las versiones &lt; V16.41), CPCI85 Central Processing/Communication (todas las versiones &lt; V5.30). Los firmwares de los dispositivos afectados contienen una vulnerabilidad de terminación nula inadecuada al analizar un encabezado HTTP específico. Esto podría permitir a un atacante ejecutar código en el contexto del proceso actual o provocar una condición de denegación de servicio.
Summary (en) A vulnerability has been identified in CPC80 Central Processing/Communication (All versions < V16.41), CPCI85 Central Processing/Communication (All versions < V5.30). The affected device firmwares contain an improper null termination vulnerability while parsing a specific HTTP header. This could allow an attacker to execute code in the context of the current process or lead to denial of service condition. (en) A vulnerability has been identified in CPC80 Central Processing/Communication (All versions < V16.41), CPCI85 Central Processing/Communication (All versions < V5.30), CPCX26 Central Processing/Communication (All versions < V06.02), ETA4 Ethernet Interface IEC60870-5-104 (All versions < V10.46), ETA5 Ethernet Int. 1x100TX IEC61850 Ed.2 (All versions < V03.27), PCCX26 Ax 1703 PE, Contr, Communication Element (All versions < V06.05). The affected devices contain an improper null termination vulnerability while parsing a specific HTTP header. This could allow an attacker to execute code in the context of the current process or lead to denial of service condition.

14 May 2024, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 16:16

Updated : 2024-07-04 07:15


NVD link : CVE-2024-31484

Mitre link : CVE-2024-31484

CVE.ORG link : CVE-2024-31484


JSON object : View

Products Affected

No product.

CWE
CWE-170

Improper Null Termination