Stack-Based Buffer Overflow in libmodbus Affects Users
CVE-2024-10918

4.8MEDIUM

Key Information:

Vendor
LIBModbus
Status
LIBModbus
Vendor
CVE Published:
27 February 2025

Summary

A stack-based buffer overflow in libmodbus version 3.1.10 poses a security risk by allowing an overflow of the buffer designated for Modbus responses. This vulnerability occurs when the software attempts to send a reply to a Modbus request that contains an unexpected length, potentially leading to compromised system integrity and unauthorized access. Users of affected versions should assess their configurations and apply necessary updates to mitigate the risk.

Affected Version(s)

libmodbus 0 <= 3.1.10

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gabriele Quagliarella of Nozomi Networks found this bug during a security research activity.
.