Remote Code Execution Vulnerability in Fuji Electric Monitouch V-SFT
CVE-2024-11789
7.8HIGH
What is CVE-2024-11789?
The vulnerability associated with the Fuji Electric Monitouch V-SFT V10 arises from a stack-based buffer overflow during the parsing of V10 files. This flaw is due to insufficient validation of user-input data lengths before they are copied into a stack-based buffer. If exploited, remote attackers can execute arbitrary code in the affected system's context, provided that the user interacts with a malicious file or navigates to a compromised web page. It is crucial for users of Monitouch V-SFT V10 to be aware of this vulnerability, particularly in environments where the software is widely implemented.
Affected Version(s)
Monitouch V-SFT 6.2.3.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
