ID

VAR-202405-1919


CVE

CVE-2024-24946


TITLE

plural  AutomationDirect  Out-of-bounds write vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2024-018884

DESCRIPTION

A heap-based buffer overflow vulnerability exists in the Programming Software Connection CurrDir functionality of AutomationDirect P3-550E 1.2.10.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger these vulnerability.This CVE tracks the heap corruption that occurs at offset `0xb686c` of version 1.2.10.9 of the P3-550E firmware, which occurs when a call to `memset` relies on an attacker-controlled length value and corrupts any trailing heap allocations. P3-550E firmware, P3-550 firmware, P3-530 firmware etc. AutomationDirect The product contains a vulnerability related to out-of-bounds writes.Information is tampered with and service operation is interrupted (DoS) It may be in a state. AutomationDirect P3-550E is a programmable control system (PLC) of AutomationDirect, Inc., USA

Trust: 2.16

sources: NVD: CVE-2024-24946 // JVNDB: JVNDB-2024-018884 // CNVD: CNVD-2024-34887

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-34887

AFFECTED PRODUCTS

vendor:automationdirectmodel:p3-550escope:eqversion:1.2.10.9

Trust: 1.6

vendor:automationdirectmodel:p1-550scope:eqversion:1.2.10.10

Trust: 1.0

vendor:automationdirectmodel:p3-550escope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p3-530scope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p1-540scope:eqversion:1.2.10.10

Trust: 1.0

vendor:automationdirectmodel:p1-550scope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p3-550scope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p1-540scope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p2-550scope:eqversion:1.2.10.10

Trust: 1.0

vendor:automationdirectmodel:p3-550scope:eqversion:1.2.10.9

Trust: 1.0

vendor:automationdirectmodel:p3-530scope:eqversion:1.2.10.9

Trust: 1.0

vendor:automationdirectmodel:p2-550scope:eqversion:4.1.1.10

Trust: 1.0

vendor:automationdirectmodel:p1-540scope: - version: -

Trust: 0.8

vendor:automationdirectmodel:p3-550escope: - version: -

Trust: 0.8

vendor:automationdirectmodel:p2-550scope: - version: -

Trust: 0.8

vendor:automationdirectmodel:p1-550scope: - version: -

Trust: 0.8

vendor:automationdirectmodel:p3-530scope: - version: -

Trust: 0.8

vendor:automationdirectmodel:p3-550scope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2024-34887 // JVNDB: JVNDB-2024-018884 // NVD: CVE-2024-24946

CVSS

SEVERITY

CVSSV2

CVSSV3

talos-cna@cisco.com: CVE-2024-24946
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-018884
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-34887
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-34887
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

talos-cna@cisco.com: CVE-2024-24946
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-018884
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-34887 // JVNDB: JVNDB-2024-018884 // NVD: CVE-2024-24946

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-018884 // NVD: CVE-2024-24946

PATCH

title:Patch for AutomationDirect P3-550E Out-of-Bounds Write Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/576371

Trust: 0.6

sources: CNVD: CNVD-2024-34887

EXTERNAL IDS

db:NVDid:CVE-2024-24946

Trust: 3.2

db:TALOSid:TALOS-2024-1937

Trust: 2.4

db:ICS CERTid:ICSA-24-144-01

Trust: 0.8

db:JVNid:JVNVU96926054

Trust: 0.8

db:JVNDBid:JVNDB-2024-018884

Trust: 0.8

db:CNVDid:CNVD-2024-34887

Trust: 0.6

sources: CNVD: CNVD-2024-34887 // JVNDB: JVNDB-2024-018884 // NVD: CVE-2024-24946

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2024-1937

Trust: 2.4

url:https://www.talosintelligence.com/vulnerability_reports/talos-2024-1937

Trust: 1.8

url:https://jvn.jp/vu/jvnvu96926054/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-24946

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-144-01

Trust: 0.8

sources: CNVD: CNVD-2024-34887 // JVNDB: JVNDB-2024-018884 // NVD: CVE-2024-24946

SOURCES

db:CNVDid:CNVD-2024-34887
db:JVNDBid:JVNDB-2024-018884
db:NVDid:CVE-2024-24946

LAST UPDATE DATE

2025-02-16T22:29:27.960000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-34887date:2024-08-08T00:00:00
db:JVNDBid:JVNDB-2024-018884date:2025-02-13T02:05:00
db:NVDid:CVE-2024-24946date:2025-02-12T18:34:36.453

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-34887date:2024-08-08T00:00:00
db:JVNDBid:JVNDB-2024-018884date:2025-02-13T00:00:00
db:NVDid:CVE-2024-24946date:2024-05-28T16:15:13.383