Search criteria
9 vulnerabilities found for kv_replay_viewer by keyence
FKIE_CVE-2024-29218
Vulnerability from fkie_nvd - Published: 2024-04-15 11:15 - Updated: 2025-06-30 13:57
Severity ?
Summary
Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU95439120/ | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.keyence.com/kv_vulnerability240924_en | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU95439120/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.keyence.com/kv_vulnerability240329_en | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| keyence | kv_replay_viewer | * | |
| keyence | kv_studio | * | |
| keyence | vt5-wx15_firmware | * | |
| keyence | vt5-wx15 | - | |
| keyence | vt5-wx12_firmware | * | |
| keyence | vt5-wx12 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9F5A92-6195-4415-A328-337BDCD5C391",
"versionEndIncluding": "2.64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B7AF88-7E5B-4CAC-A548-033DBEE9E1C9",
"versionEndIncluding": "11.64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:keyence:vt5-wx15_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E68010F1-7935-4D0D-9F03-CE87D8717ADA",
"versionEndIncluding": "6.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:keyence:vt5-wx15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA61E229-B8F6-4448-9625-366A1012A903",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:keyence:vt5-wx12_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA67FB0-5E52-4203-B311-ADAB4A3A603F",
"versionEndIncluding": "6.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:keyence:vt5-wx12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "280DBDC0-502B-4F0A-AABA-6B88082C74B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de escritura fuera de los l\u00edmites en KV STUDIO Ver.11.64 y anteriores y en KV REPLAY VIEWER Ver.2.64 y anteriores, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario al hacer que un usuario del producto afectado abra un archivo especialmente manipulado."
}
],
"id": "CVE-2024-29218",
"lastModified": "2025-06-30T13:57:35.287",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-04-15T11:15:08.533",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "vultures@jpcert.or.jp",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-29219
Vulnerability from fkie_nvd - Published: 2024-04-15 11:15 - Updated: 2025-09-19 18:15
Severity ?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU95439120/ | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.keyence.com/kv_vulnerability240924_en | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU95439120/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.keyence.com/kv_vulnerability240329_en | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| keyence | kv_replay_viewer | * | |
| keyence | kv_studio | * | |
| keyence | vt5-wx15_firmware | * | |
| keyence | vt5-wx15 | - | |
| keyence | vt5-wx12_firmware | * | |
| keyence | vt5-wx12 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9F5A92-6195-4415-A328-337BDCD5C391",
"versionEndIncluding": "2.64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B7AF88-7E5B-4CAC-A548-033DBEE9E1C9",
"versionEndIncluding": "11.64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:keyence:vt5-wx15_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E68010F1-7935-4D0D-9F03-CE87D8717ADA",
"versionEndIncluding": "6.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:keyence:vt5-wx15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA61E229-B8F6-4448-9625-366A1012A903",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:keyence:vt5-wx12_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA67FB0-5E52-4203-B311-ADAB4A3A603F",
"versionEndIncluding": "6.02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:keyence:vt5-wx12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "280DBDC0-502B-4F0A-AABA-6B88082C74B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de lectura fuera de los l\u00edmites en KV STUDIO Ver.11.64 y anteriores y en KV REPLAY VIEWER Ver.2.64 y anteriores, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario al hacer que un usuario del producto afectado abra un archivo especialmente manipulado."
}
],
"id": "CVE-2024-29219",
"lastModified": "2025-09-19T18:15:35.770",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-04-15T11:15:08.593",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "vultures@jpcert.or.jp",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-42138
Vulnerability from fkie_nvd - Published: 2023-10-11 09:15 - Updated: 2024-11-21 08:22
Severity ?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file.
References
| URL | Tags | ||
|---|---|---|---|
| vultures@jpcert.or.jp | https://jvn.jp/en/vu/JVNVU94752076/index.html | Third Party Advisory | |
| vultures@jpcert.or.jp | https://www.keyence.com/vulnerability231001 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU94752076/index.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.keyence.com/vulnerability231001 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| keyence | kv_replay_viewer | * | |
| keyence | kv_studio | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7533712-71AB-44CD-86F7-7F694FE353B9",
"versionEndExcluding": "2.63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFABC3F-F01D-4B37-9D66-929A396D2E27",
"versionEndExcluding": "11.63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de lectura fuera de l\u00edmites en KV STUDIO Ver. 11.62 y anteriores y KV REPLAY VIEWER Ver. 2.62 y anteriores. Si se explota esta vulnerabilidad, se puede divulgar informaci\u00f3n o se puede ejecutar c\u00f3digo arbitrario haciendo que un usuario de KV STUDIO PLAYER abra un archivo especialmente manipulado."
}
],
"id": "CVE-2023-42138",
"lastModified": "2024-11-21T08:22:21.193",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-11T09:15:10.417",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/vulnerability231001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.keyence.com/vulnerability231001"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-29219 (GCVE-0-2024-29219)
Vulnerability from cvelistv5 – Published: 2024-04-15 10:41 – Updated: 2025-09-19 17:21
VLAI?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
Severity ?
7.8 (High)
CWE
- CWE-125 - Out-of-bounds read
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver.11.64 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_replay_viewer",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "2.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_studio",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "11.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-29219",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-16T16:04:52.454295Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T17:21:43.118Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:10:54.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.11.64 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.2.64 and earlier"
}
]
},
{
"product": "VT5-WX15/WX12",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.6.02 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "Out-of-bounds read",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T03:59:23.777Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-29219",
"datePublished": "2024-04-15T10:41:33.292Z",
"dateReserved": "2024-03-19T02:07:19.158Z",
"dateUpdated": "2025-09-19T17:21:43.118Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29218 (GCVE-0-2024-29218)
Vulnerability from cvelistv5 – Published: 2024-04-15 10:37 – Updated: 2024-09-25 03:52
VLAI?
Summary
Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
Severity ?
8.8 (High)
CWE
- CWE-787 - Out-of-bounds write
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver.11.64 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_replay_viewer",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "2.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_studio",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "11.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-29218",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-15T18:21:17.992855Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-16T16:08:16.229Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:10:55.392Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.11.64 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.2.64 and earlier"
}
]
},
{
"product": "VT5-WX15/WX12",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.6.02 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "Out-of-bounds write",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T03:52:10.512Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-29218",
"datePublished": "2024-04-15T10:37:59.927Z",
"dateReserved": "2024-03-19T02:07:19.158Z",
"dateUpdated": "2024-09-25T03:52:10.512Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-42138 (GCVE-0-2023-42138)
Vulnerability from cvelistv5 – Published: 2023-10-11 08:53 – Updated: 2024-09-18 15:56
VLAI?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file.
Severity ?
No CVSS data available.
CWE
- Out-of-bounds read
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver. 11.62 and earlier
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:50.569Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/vulnerability231001"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42138",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-18T15:56:37.843128Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-18T15:56:54.316Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver. 11.62 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver. 2.62 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-11T08:53:24.872Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/vulnerability231001"
},
{
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-42138",
"datePublished": "2023-10-11T08:53:24.872Z",
"dateReserved": "2023-09-08T02:20:58.383Z",
"dateUpdated": "2024-09-18T15:56:54.316Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29219 (GCVE-0-2024-29219)
Vulnerability from nvd – Published: 2024-04-15 10:41 – Updated: 2025-09-19 17:21
VLAI?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
Severity ?
7.8 (High)
CWE
- CWE-125 - Out-of-bounds read
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver.11.64 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_replay_viewer",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "2.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_studio",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "11.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-29219",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-16T16:04:52.454295Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T17:21:43.118Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:10:54.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.11.64 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.2.64 and earlier"
}
]
},
{
"product": "VT5-WX15/WX12",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.6.02 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "Out-of-bounds read",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T03:59:23.777Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-29219",
"datePublished": "2024-04-15T10:41:33.292Z",
"dateReserved": "2024-03-19T02:07:19.158Z",
"dateUpdated": "2025-09-19T17:21:43.118Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29218 (GCVE-0-2024-29218)
Vulnerability from nvd – Published: 2024-04-15 10:37 – Updated: 2024-09-25 03:52
VLAI?
Summary
Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file.
Severity ?
8.8 (High)
CWE
- CWE-787 - Out-of-bounds write
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver.11.64 and earlier
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:keyence:kv_replay_viewer:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_replay_viewer",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "2.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:keyence:kv_studio:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "kv_studio",
"vendor": "keyence",
"versions": [
{
"lessThanOrEqual": "11.64",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-29218",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-15T18:21:17.992855Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-16T16:08:16.229Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:10:55.392Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/kv_vulnerability240329_en"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.11.64 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.2.64 and earlier"
}
]
},
{
"product": "VT5-WX15/WX12",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver.6.02 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier, KV REPLAY VIEWER Ver.2.64 and earlier, and VT5-WX15/WX12 Ver.6.02 and earlier, which may lead to information disclosure or arbitrary code execution by having a user of the affected product open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "Out-of-bounds write",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-25T03:52:10.512Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/kv_vulnerability240924_en"
},
{
"url": "https://jvn.jp/en/vu/JVNVU95439120/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2024-29218",
"datePublished": "2024-04-15T10:37:59.927Z",
"dateReserved": "2024-03-19T02:07:19.158Z",
"dateUpdated": "2024-09-25T03:52:10.512Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-42138 (GCVE-0-2023-42138)
Vulnerability from nvd – Published: 2023-10-11 08:53 – Updated: 2024-09-18 15:56
VLAI?
Summary
Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file.
Severity ?
No CVSS data available.
CWE
- Out-of-bounds read
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| KEYENCE CORPORATION | KV STUDIO |
Affected:
Ver. 11.62 and earlier
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:16:50.569Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.keyence.com/vulnerability231001"
},
{
"tags": [
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-42138",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-18T15:56:37.843128Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-18T15:56:54.316Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "KV STUDIO",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver. 11.62 and earlier"
}
]
},
{
"product": "KV REPLAY VIEWER",
"vendor": "KEYENCE CORPORATION",
"versions": [
{
"status": "affected",
"version": "Ver. 2.62 and earlier"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability exists in KV STUDIO Ver. 11.62 and earlier and KV REPLAY VIEWER Ver. 2.62 and earlier. If this vulnerability is exploited, information may be disclosed or arbitrary code may be executed by having a user of KV STUDIO PLAYER open a specially crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out-of-bounds read",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-11T08:53:24.872Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"url": "https://www.keyence.com/vulnerability231001"
},
{
"url": "https://jvn.jp/en/vu/JVNVU94752076/index.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2023-42138",
"datePublished": "2023-10-11T08:53:24.872Z",
"dateReserved": "2023-09-08T02:20:58.383Z",
"dateUpdated": "2024-09-18T15:56:54.316Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}