Remote Code Execution Vulnerability in Fuji Electric Tellus Lite V-Simulator
CVE-2024-11800
7.8HIGH
What is CVE-2024-11800?
The vulnerability in Fuji Electric's Tellus Lite V-Simulator 5 occurs due to a stack-based buffer overflow during the parsing of V8 files. This flaw originates from insufficient validation of the length of user-supplied data before it is copied to a fixed-length buffer on the stack. As a result, an attacker who successfully exploits this vulnerability can execute arbitrary code in the context of the current process, provided that a user interacts with a malicious page or file. This security issue demands urgent attention to secure installations against potential remote attacks.
Affected Version(s)
Tellus Lite 4.0.20.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
