ID

VAR-202411-1676


CVE

CVE-2024-11792


TITLE

Fuji Electric's  Monitouch V-SFT  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-013911

DESCRIPTION

Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24502. Fuji Electric's Monitouch V-SFT Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fuji Electric Monitouch V-SFT is human-machine interface (HMI) configuration software developed by Fuji Electric. It is primarily used in industrial automation and provides functions such as touchscreen interface design, PDF document viewing, video playback, and alarm notifications

Trust: 2.79

sources: NVD: CVE-2024-11792 // JVNDB: JVNDB-2024-013911 // ZDI: ZDI-24-1618 // CNVD: CNVD-2025-21058

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-21058

AFFECTED PRODUCTS

vendor:fujielectricmodel:monitouch v-sftscope:eqversion:6.2.3.0

Trust: 1.0

vendor:富士電機model:monitouch v-sftscope: - version: -

Trust: 0.8

vendor:富士電機model:monitouch v-sftscope:eqversion: -

Trust: 0.8

vendor:富士電機model:monitouch v-sftscope:eqversion:6.2.3.0

Trust: 0.8

vendor:fuji electricmodel:monitouch v-sftscope: - version: -

Trust: 0.7

vendor:fujimodel:electric monitouch v-sftscope:eqversion:6.2.3.0

Trust: 0.6

sources: ZDI: ZDI-24-1618 // CNVD: CNVD-2025-21058 // JVNDB: JVNDB-2024-013911 // NVD: CVE-2024-11792

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2024-11792
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-11792
value: HIGH

Trust: 1.0

NVD: CVE-2024-11792
value: HIGH

Trust: 0.8

ZDI: CVE-2024-11792
value: HIGH

Trust: 0.7

CNVD: CNVD-2025-21058
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-21058
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2024-11792
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2024-11792
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2024-11792
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-1618 // CNVD: CNVD-2025-21058 // JVNDB: JVNDB-2024-013911 // NVD: CVE-2024-11792 // NVD: CVE-2024-11792

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-013911 // NVD: CVE-2024-11792

EXTERNAL IDS

db:NVDid:CVE-2024-11792

Trust: 3.9

db:ZDIid:ZDI-24-1618

Trust: 3.1

db:ICS CERTid:ICSA-24-338-05

Trust: 0.8

db:JVNid:JVNVU98326656

Trust: 0.8

db:JVNDBid:JVNDB-2024-013911

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-24502

Trust: 0.7

db:CNVDid:CNVD-2025-21058

Trust: 0.6

sources: ZDI: ZDI-24-1618 // CNVD: CNVD-2025-21058 // JVNDB: JVNDB-2024-013911 // NVD: CVE-2024-11792

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-24-1618/

Trust: 2.4

url:https://jvn.jp/vu/jvnvu98326656/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-11792

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-05

Trust: 0.8

sources: CNVD: CNVD-2025-21058 // JVNDB: JVNDB-2024-013911 // NVD: CVE-2024-11792

CREDITS

kimiya

Trust: 0.7

sources: ZDI: ZDI-24-1618

SOURCES

db:ZDIid:ZDI-24-1618
db:CNVDid:CNVD-2025-21058
db:JVNDBid:JVNDB-2024-013911
db:NVDid:CVE-2024-11792

LAST UPDATE DATE

2025-10-17T22:50:19.114000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-1618date:2024-11-27T00:00:00
db:CNVDid:CNVD-2025-21058date:2025-09-11T00:00:00
db:JVNDBid:JVNDB-2024-013911date:2024-12-05T07:02:00
db:NVDid:CVE-2024-11792date:2024-12-03T16:07:42.940

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-1618date:2024-11-27T00:00:00
db:CNVDid:CNVD-2025-21058date:2025-09-11T00:00:00
db:JVNDBid:JVNDB-2024-013911date:2024-12-04T00:00:00
db:NVDid:CVE-2024-11792date:2024-11-28T00:15:04.603