4.3
CVE-2024-40723
- EPSS 1.42%
- Veröffentlicht 02.08.2024 11:16:43
- Zuletzt bearbeitet 09.08.2024 14:44:01
- Quelle twcert@cert.org.tw
- CVE-Watchlists
- Unerledigt
The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Changingtec ≫ Hwatai Servisign SwPlatformwindows Version < 1.0.24.0219
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.42% | 0.8 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| twcert@cert.org.tw | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.