All the vulnerabilites related to NI - IO Trace Tool
cve-2024-5602
Vulnerability from cvelistv5
Published
2024-07-23 13:15
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
Stack-based Buffer Overflow Vulnerability in NI I/O Trace Tool
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | NI | IO Trace Tool |
Version: 0 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:ni:system_configuration:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "system_configuration", "vendor": "ni", "versions": [ { "lessThanOrEqual": "24.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-23T14:06:24.315632Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T14:11:46.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:06.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "IO Trace Tool", "vendor": "NI", "versions": [ { "lessThanOrEqual": "24.3", "status": "affected", "version": "0", "versionType": "server" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Heinzl working with CISA" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cp\u003eThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.\u202f\u0026nbsp; \u003c/p\u003e\u003cbr\u003e" } ], "value": "A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.\n\nThe NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.\u202f Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-23T13:15:50.508Z", "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4", "shortName": "NI" }, "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/stack-based-buffer-overflow-vulnerability-in-ni-io-trace-tool.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Stack-based Buffer Overflow Vulnerability in NI I/O Trace Tool", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4", "assignerShortName": "NI", "cveId": "CVE-2024-5602", "datePublished": "2024-07-23T13:15:50.508Z", "dateReserved": "2024-06-03T18:30:25.158Z", "dateUpdated": "2024-08-01T21:18:06.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }