Stack-based Buffer Overflow in libmodbus library

CVE-2024-10918

Summary

Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.

Impact

If the library tries to reply to a Modbus request with unexpected length, then a buffer overflow occurs.

Issue Date

February 24, 2025

Affects

This issue affects libmodbus v3.1.10

CVE Name

CVE-2024-10918

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

CVSS Score

4.8

Solution

To fix this issue, it's suggested to update libmodbus to v3.1.11

Mitigations

Acknowledgements

Gabriele Quagliarella

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Iranian APT Activity During Geopolitical Escalation: Recommendations for Nozomi Customers and Critical Infrastructure Owners

Read

Detecting New OT Threats: How To Do It Proactively 

Read

Smile, You’re Being Hacked: Nozomi Networks Labs Finds Five New Flaws in Hanwha Wisenet Cameras

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.