VAR-202405-1919

Vulnerability from variot - Updated: 2025-02-16 22:29

A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset 0xb686c of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to memset relies on an attacker-controlled length value and corrupts any trailing heap allocations. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect The product contains a vulnerability related to out-of-bounds writes.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202405-1919",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "p3-550e",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "automationdirect",
        "version": "1.2.10.9"
      },
      {
        "model": "p1-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "1.2.10.10"
      },
      {
        "model": "p3-550e",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p3-530",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p1-540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "1.2.10.10"
      },
      {
        "model": "p1-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p3-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p1-540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p2-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "1.2.10.10"
      },
      {
        "model": "p3-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "1.2.10.9"
      },
      {
        "model": "p3-530",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "1.2.10.9"
      },
      {
        "model": "p2-550",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "automationdirect",
        "version": "4.1.1.10"
      },
      {
        "model": "p1-540",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      },
      {
        "model": "p3-550e",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      },
      {
        "model": "p2-550",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      },
      {
        "model": "p1-550",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      },
      {
        "model": "p3-530",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      },
      {
        "model": "p3-550",
        "scope": null,
        "trust": 0.8,
        "vendor": "automationdirect",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "cve": "CVE-2024-24946",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2024-34887",
            "impactScore": 7.8,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "talos-cna@cisco.com",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2024-24946",
            "impactScore": 4.2,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "High",
            "baseScore": 8.2,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2024-018884",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "talos-cna@cisco.com",
            "id": "CVE-2024-24946",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2024-018884",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2024-34887",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect The product contains a vulnerability related to out-of-bounds writes.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-24946",
        "trust": 3.2
      },
      {
        "db": "TALOS",
        "id": "TALOS-2024-1937",
        "trust": 2.4
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-24-144-01",
        "trust": 0.8
      },
      {
        "db": "JVN",
        "id": "JVNVU96926054",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "id": "VAR-202405-1919",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      }
    ]
  },
  "last_update_date": "2025-02-16T22:29:27.960000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for AutomationDirect P3-550E Out-of-Bounds Write Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/576371"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Out-of-bounds writing (CWE-787) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "https://talosintelligence.com/vulnerability_reports/talos-2024-1937"
      },
      {
        "trust": 1.8,
        "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2024-1937"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu96926054/"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-24946"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-144-01"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-08-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "date": "2025-02-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "date": "2024-05-28T16:15:13.383000",
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2024-08-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2024-34887"
      },
      {
        "date": "2025-02-13T02:05:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      },
      {
        "date": "2025-02-12T18:34:36.453000",
        "db": "NVD",
        "id": "CVE-2024-24946"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0AutomationDirect\u00a0 Out-of-bounds write vulnerabilities in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-018884"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…