2024-11-11 17:03:20 +00:00
{
"id" : "CVE-2024-39605" ,
"sourceIdentifier" : "ics-cert@hq.dhs.gov" ,
"published" : "2024-11-11T15:15:05.527" ,
2025-01-30 15:03:51 +00:00
"lastModified" : "2025-01-30T14:34:40.630" ,
"vulnStatus" : "Analyzed" ,
2024-11-11 17:03:20 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code."
2024-11-12 15:03:42 +00:00
} ,
{
"lang" : "es" ,
"value" : "Si un atacante enga\u00f1a a un usuario v\u00e1lido para que ejecute Delta Electronics DIAScreen con un archivo que contiene c\u00f3digo malicioso, se puede explotar un desbordamiento de b\u00fafer basado en pila en BACnetParameter, lo que permite al atacante ejecutar de forma remota c\u00f3digo arbitrario."
2024-11-11 17:03:20 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "ics-cert@hq.dhs.gov" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.4 ,
"baseSeverity" : "HIGH" ,
2024-11-11 17:03:20 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "ACTIVE" ,
2025-03-02 03:03:52 +00:00
"vulnConfidentialityImpact" : "HIGH" ,
"vulnIntegrityImpact" : "HIGH" ,
"vulnAvailabilityImpact" : "HIGH" ,
"subConfidentialityImpact" : "NONE" ,
"subIntegrityImpact" : "NONE" ,
"subAvailabilityImpact" : "NONE" ,
2024-11-11 17:03:20 +00:00
"exploitMaturity" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
2024-11-11 17:03:20 +00:00
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
2025-03-02 03:03:52 +00:00
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
2024-11-11 17:03:20 +00:00
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "NOT_DEFINED"
2024-11-11 17:03:20 +00:00
}
}
] ,
"cvssMetricV31" : [
{
"source" : "ics-cert@hq.dhs.gov" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2024-11-11 17:03:20 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-11-11 17:03:20 +00:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2025-01-30 15:03:51 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2024-11-11 17:03:20 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "ics-cert@hq.dhs.gov" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2024-11-11 17:03:20 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-121"
}
]
2025-01-30 15:03:51 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:deltaww:diascreen:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.5.0" ,
"matchCriteriaId" : "4130B745-1597-420D-A2B0-2B56F077E60C"
}
]
}
]
2024-11-11 17:03:20 +00:00
}
] ,
"references" : [
{
"url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-24-312-02" ,
2025-01-30 15:03:51 +00:00
"source" : "ics-cert@hq.dhs.gov" ,
"tags" : [
"US Government Resource"
]
2024-11-11 17:03:20 +00:00
} ,
{
"url" : "https://www.deltaww.com/en-US/Cybersecurity_Advisory" ,
2025-01-30 15:03:51 +00:00
"source" : "ics-cert@hq.dhs.gov" ,
"tags" : [
"Vendor Advisory"
]
2024-11-11 17:03:20 +00:00
}
]
}