Advisory Details

November 27th, 2024

(0Day) Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

ZDI-24-1623
ZDI-CAN-24662

CVE ID CVE-2024-11797
CVSS SCORE 7.8, AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Fuji Electric
AFFECTED PRODUCTS Monitouch V-SFT
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

ADDITIONAL DETAILS

07/25/24 - ZDI reported the vulnerability to the vendor
08/21/24 - the vendor confirmed the reported issue and requested an extension until April 2025
10/07/24 - ZDI notified the vendor of the intention to publish the case as 0-day advisory

Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application


DISCLOSURE TIMELINE
  • 2024-07-25 - Vulnerability reported to vendor
  • 2024-11-27 - Coordinated public release of advisory
  • 2024-11-27 - Advisory Updated
CREDIT kimiya
BACK TO ADVISORIES