Remote Code Execution Vulnerability in Fuji Electric Monitouch V-SFT Due to Stack-based Buffer Overflow
CVE-2024-11792
7.8HIGH
What is CVE-2024-11792?
The vulnerability in Fuji Electric's Monitouch V-SFT V8 occurs due to improper validation of user-supplied data lengths during V8 file parsing. This stack-based buffer overflow can be exploited by attackers to execute arbitrary code within the current process. Successful exploitation requires user interaction, where the target user must either visit a malicious page or open a specially crafted file to trigger the flaw. As a result, installations of Monitouch V-SFT can be significantly compromised, underscoring the importance of timely updates and patches.
Affected Version(s)
Monitouch V-SFT 6.2.3.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
