ID

VAR-202411-1622


CVE

CVE-2024-11791


TITLE

Fuji Electric's  Monitouch V-SFT  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-013892

DESCRIPTION

Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of V8C files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24450. Fuji Electric's Monitouch V-SFT Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fuji Electric Monitouch V-SFT is human-machine interface (HMI) configuration software developed by Fuji Electric. It is primarily used in industrial automation and provides functions such as touchscreen interface design, PDF document viewing, video playback, and alarm notifications

Trust: 2.79

sources: NVD: CVE-2024-11791 // JVNDB: JVNDB-2024-013892 // ZDI: ZDI-24-1617 // CNVD: CNVD-2025-21057

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-21057

AFFECTED PRODUCTS

vendor:fujielectricmodel:monitouch v-sftscope:eqversion:6.2.3.0

Trust: 1.0

vendor:富士電機model:monitouch v-sftscope: - version: -

Trust: 0.8

vendor:富士電機model:monitouch v-sftscope:eqversion: -

Trust: 0.8

vendor:富士電機model:monitouch v-sftscope:eqversion:6.2.3.0

Trust: 0.8

vendor:fuji electricmodel:monitouch v-sftscope: - version: -

Trust: 0.7

vendor:fujimodel:electric monitouch v-sftscope:eqversion:6.2.3.0

Trust: 0.6

sources: ZDI: ZDI-24-1617 // CNVD: CNVD-2025-21057 // JVNDB: JVNDB-2024-013892 // NVD: CVE-2024-11791

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2024-11791
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-11791
value: HIGH

Trust: 1.0

NVD: CVE-2024-11791
value: HIGH

Trust: 0.8

ZDI: CVE-2024-11791
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-21057
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-21057
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2024-11791
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2024-11791
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2024-11791
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-1617 // CNVD: CNVD-2025-21057 // JVNDB: JVNDB-2024-013892 // NVD: CVE-2024-11791 // NVD: CVE-2024-11791

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-013892 // NVD: CVE-2024-11791

EXTERNAL IDS

db:NVDid:CVE-2024-11791

Trust: 3.9

db:ZDIid:ZDI-24-1617

Trust: 3.1

db:ICS CERTid:ICSA-24-338-05

Trust: 0.8

db:JVNid:JVNVU98326656

Trust: 0.8

db:JVNDBid:JVNDB-2024-013892

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-24450

Trust: 0.7

db:CNVDid:CNVD-2025-21057

Trust: 0.6

sources: ZDI: ZDI-24-1617 // CNVD: CNVD-2025-21057 // JVNDB: JVNDB-2024-013892 // NVD: CVE-2024-11791

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-24-1617/

Trust: 2.4

url:https://jvn.jp/vu/jvnvu98326656/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-11791

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-05

Trust: 0.8

sources: CNVD: CNVD-2025-21057 // JVNDB: JVNDB-2024-013892 // NVD: CVE-2024-11791

CREDITS

kimiya

Trust: 0.7

sources: ZDI: ZDI-24-1617

SOURCES

db:ZDIid:ZDI-24-1617
db:CNVDid:CNVD-2025-21057
db:JVNDBid:JVNDB-2024-013892
db:NVDid:CVE-2024-11791

LAST UPDATE DATE

2025-10-17T22:50:19.045000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-1617date:2024-11-27T00:00:00
db:CNVDid:CNVD-2025-21057date:2025-09-11T00:00:00
db:JVNDBid:JVNDB-2024-013892date:2024-12-05T07:02:00
db:NVDid:CVE-2024-11791date:2024-12-03T16:08:22.910

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-1617date:2024-11-27T00:00:00
db:CNVDid:CNVD-2025-21057date:2025-09-11T00:00:00
db:JVNDBid:JVNDB-2024-013892date:2024-12-04T00:00:00
db:NVDid:CVE-2024-11791date:2024-11-28T00:15:04.467