cve/2024/CVE-2024-1916.md

44 lines
3.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-1916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1916)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L02CPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L02CPU-P&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L06CPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L06CPU-P&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L26CPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L26CPU-BT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L26CPU-P&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-L%20Series%20L26CPU-PBT&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q03UDECPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q03UDVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q04UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q04UDPVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q04UDVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q06UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q06UDPVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q06UDVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q100UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q10UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q13UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q13UDPVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q13UDVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q20UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q26UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q26UDPVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q26UDVCPU&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=MELSEC-Q%20Series%20Q50UDEHCPU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20The%20first%205%20digits%20of%20serial%20No.%20%2226041%22%20and%20prior%20&color=brighgreen)
2024-06-22 09:37:59 +00:00
![](https://img.shields.io/static/v1?label=Version&message=%3D%20The%20first%205%20digits%20of%20serial%20No.%20%2226061%22%20and%20prior%20&color=brighgreen)
2024-05-25 21:48:12 +02:00
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20Integer%20Overflow%20or%20Wraparound&color=brighgreen)
### Description
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds