If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.

Project Subscriptions

Vendors Products
Deltaww Subscribe
Diascreen Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-42283 If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
Fixes

Solution

Delta Electronics has released v1.5.0 of DIAScreen (login required) https://diastudio.deltaww.com/home/downloads  and recommends users install this update on all affected systems. For more information, please see the Delta product cybersecurity advisory for these issues. https://www.deltaww.com/en-US/Cybersecurity_Advisory


Workaround

No workaround given by the vendor.

History

Thu, 30 Jan 2025 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787

Mon, 11 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Deltaww
Deltaww diascreen
CPEs cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*
Vendors & Products Deltaww
Deltaww diascreen
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 Nov 2024 15:00:00 +0000

Type Values Removed Values Added
Description If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.
Title Delta Electronics DIAScreen Stack-based Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-11-11T16:06:36.044Z

Reserved: 2024-09-18T21:32:27.326Z

Link: CVE-2024-47131

cve-icon Vulnrichment

Updated: 2024-11-11T16:06:23.992Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-11T15:15:06.153

Modified: 2025-01-30T14:35:10.020

Link: CVE-2024-47131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses