Directory Path Traversal Vulnerability in NI VeriStand Could Lead to Remote Code Execution
CVE-2024-6791

7.8HIGH

Key Information:

Vendor

Ni

Status
Vendor
CVE Published:
22 July 2024

What is CVE-2024-6791?

A directory path traversal vulnerability has been identified in NI VeriStand software, impacting versions 2024 Q2 and earlier. This vulnerability arises during the process of loading a .vsmodel file, potentially enabling an attacker to execute remote code on the affected system. For exploitation to be successful, it requires social engineering tactics to persuade a user into opening a specially crafted .vsmodel file. Organizations using NI VeriStand need to implement security measures to mitigate risks associated with this vulnerability.

Affected Version(s)

VeriStand Windows 0 <= 24.2

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

kimiya working with Trend Micro Zero Day Initiative
.