CVE-2024-7490

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)

Published: Aug 8, 2024 / Updated: 3mo ago

010
CVSS 9.5EPSS 0.12%Critical
CVE info copied to clipboard

Summary

An Improper Input Validation vulnerability has been identified in Microchip Technology's Advanced Software Framework (ASF) example DHCP server. This vulnerability can lead to a buffer overflow, potentially resulting in remote code execution. The issue is specifically associated with the program file tinydhcpserver.C and the program routine lwip_dhcp_find_option. This vulnerability affects Advanced Software Framework versions through 3.52.0.2574.

Impact

This vulnerability has a critical severity with a CVSS v4 base score of 9.5. The potential impacts are severe: 1. Remote Code Execution: Attackers can potentially execute arbitrary code on the affected system remotely. 2. Confidentiality Breach: The vulnerability allows for high impact on the vulnerable system's confidentiality. 3. Integrity Compromise: There is a high risk to the integrity of the vulnerable system. 4. Availability Impact: The vulnerability poses a high risk to the availability of the vulnerable system. 5. Subsequent System Effects: The vulnerability can have high impacts on the confidentiality, integrity, and availability of subsequent systems. Given the network attack vector and low attack complexity, this vulnerability could be easily exploited by remote attackers without requiring user interaction or privileges.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the latest information provided, a patch is not explicitly mentioned. However, the vulnerability affects Advanced Software Framework versions through 3.52.0.2574. It is crucial to check for updates from Microchip Technology for versions newer than 3.52.0.2574 that may address this vulnerability.

Mitigation

While waiting for a patch, consider the following mitigation strategies: 1. Network Segmentation: Isolate systems running the vulnerable DHCP server example from untrusted networks. 2. Access Control: Implement strict access controls to limit exposure of the vulnerable systems. 3. Input Validation: If possible, implement additional input validation for DHCP requests before they reach the vulnerable component. 4. Monitoring: Enhance monitoring for unusual activities or potential exploitation attempts targeting DHCP services. 5. Alternative Solutions: Consider using alternative DHCP server implementations until a patch is available. 6. Version Control: Ensure all instances of the Advanced Software Framework are identified and their versions are known to facilitate rapid patching when available. Given the critical severity, it is strongly recommended to prioritize addressing this vulnerability in your patching and remediation efforts.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

CVE Assignment

NVD published the first details for CVE-2024-7490

Aug 8, 2024 at 3:15 PM
CVSS

A CVSS base score of 9.5 has been assigned.

Aug 8, 2024 at 3:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-7490. See article

Aug 8, 2024 at 3:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Aug 8, 2024 at 3:21 PM
Threat Intelligence Report

CVE-2024-7490 is a critical vulnerability that has been mentioned in the first article found by Feedly. It is currently being exploited in the wild by threat actors, with proof-of-concept exploits available. Mitigations, detections, and patches are not yet available, posing potential downstream impacts to other third-party vendors and technologies. See article

Aug 9, 2024 at 9:46 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Aug 12, 2024 at 3:25 PM / nvd
Trending

This CVE started to trend in security discussions

Sep 24, 2024 at 6:04 AM
Trending

This CVE stopped trending in security discussions

Sep 26, 2024 at 11:37 AM
Static CVE Timeline Graph

Affected Systems

Microchip/advanced_software_framework
+null more

Patches

www.microchip.com
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

References

CVE-2024-7490 - Exploits & Severity - Feedly
An Improper Input Validation vulnerability has been identified in Microchip Technology's Advanced Software Framework (ASF) example DHCP server. This vulnerability has a critical severity with a CVSS v4 base score of 9.5.

News

Update Sun Oct 13 14:25:38 UTC 2024
Update Sun Oct 13 14:25:38 UTC 2024
The SOS Intelligence CVE Chatter Weekly Top Ten – 07 October 2024
Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow. A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.
Nothing Is Safe - PSW #845
This report is eye-opening: "An advisory jointly issued Wednesday by the FBI, the Cyber National Mission Force, and the National Security Agency said that China-based company Integrity Technology Group controlled and managed Raptor Train. CVE-2024-7490 There exists a vulnerability in all publicly available examples of the ASF codebase that allows for a specially crafted DHCP request to cause a stack-based overflow that could lead to remote code execution."
Ankura Cyber Threat Investigations FLASH Wrap-Up [Report]: September 2024
o Bleeping Computer: Linux Version of New Cicada Ransomware o Dark Reading: BlackCat Spinoff Uses Stolen Creds on the Fly, Skirts EDR MacroPack Red Teaming Tool Abused by Threat Actors Globally Reported in the September 6th, 2024, FLASH Update • Content Researchers have discovered that MacroPack – an attacker emulation software – is being abused by multiple cyber threat actors. Reported in the September 4th, 2024, FLASH Update • Cicada3301 ransomware is attacking companies in North America and Europe with a sophisticated form of ransomware resembling BlackCat. Cicada3301 is a ransomware-as-a-service (RaaS) operation which emerged in June 2024, shortly after the ALPHV/BlackCat ransomware group performed an exit scam in March 2024 after stealing a $22 million ransom from one of their affiliates.
Weekly IT Vulnerability Report: Cyble Urges Fixes for Ivanti, GitLab and Microchip
Recently, Ivanti disclosed that attackers could exploit the flaw by chaining CVE-2024-8963 with CVE-2024-8190 to bypass admin authentication and execute arbitrary commands on unpatched appliances. CVE-2024-20439: A critical security vulnerability affecting the Cisco Smart Licensing Utility, which could allow unauthenticated, remote attackers to gain administrative access to the system.
See 53 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI