Sploit.io - Search

Product: v-sft, version: <= 6.2.2.0

CVE-2024-38309

Severity: HIGH

Description: There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.111590000
  • Date: 2025-01-12

ExploitDB

No data available.

HackerOne Data

  • Rank: 7451
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. V-SFT - Versions: v6.2.2.0 and earlier
    • FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. TELLUS - Versions: v4.0.19.0 and earlier
    • FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. TELLUS Lite - Versions: v4.0.19.0 and earlier

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-38309 involves multiple stack-based buffer overflow issues in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier). These vulnerabilities arise when a user opens a specially crafted file, which can lead to information disclosure or arbitrary code execution. The CVSS v3.1 base score of 7.8 (HIGH severity) indicates a significant risk, with high impacts on confidentiality, integrity, and availability. The attack vector is local, requiring user interaction, but the low attack complexity and no privileges required make exploitation relatively straightforward for an attacker with access to a crafted file. The likelihood of exploitation is moderate, given the need for user interaction, but the potential impact is severe, as successful exploitation could lead to full system compromise, data theft, or disruption of operations.

    2. Potential Attack Scenarios
    An attacker could craft a malicious file designed to exploit the stack-based buffer overflow vulnerability in the affected software. The attack begins when the attacker delivers the malicious file to a target user, potentially through phishing emails, malicious downloads, or compromised websites. Once the user opens the file in V-SFT, TELLUS, or TELLUS Lite, the buffer overflow is triggered, allowing the attacker to execute arbitrary code within the context of the application. This could result in the disclosure of sensitive information stored on the system, modification or deletion of critical data, or installation of malware for further exploitation. In industrial environments where these products are used, such an attack could disrupt operations, compromise proprietary systems, or lead to significant financial and reputational damage.

    3. Mitigation Recommendations
    Immediate action is required to mitigate the risks associated with this vulnerability. Organizations using affected versions of V-SFT, TELLUS, or TELLUS Lite should apply patches or updates provided by the vendor as soon as they become available. Until patches are applied, users should avoid opening files from untrusted or unknown sources. Implementing strict access controls and network segmentation can limit the exposure of vulnerable systems. Additionally, organizations should monitor for any signs of exploitation, such as unusual file activity or unexpected system behavior. For further guidance, refer to the vendor's advisory at https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php and the JVN report at https://jvn.jp/en/vu/JVNVU97531313/.

    4. Executive Summary
    CVE-2024-38309 is a high-severity vulnerability affecting multiple versions of V-SFT, TELLUS, and TELLUS Lite software. Exploitation of this vulnerability could allow attackers to execute arbitrary code, disclose sensitive information, or disrupt operations, posing significant risks to confidentiality, integrity, and availability. While exploitation requires user interaction, the potential impact is severe, particularly in industrial environments where these products are used. Immediate action is recommended, including applying vendor-provided patches, restricting access to vulnerable systems, and educating users about the risks of opening untrusted files. Addressing this vulnerability is critical to safeguarding systems, data, and business operations from potential compromise.