Stack-based Buffer Overflow in libmodbus library

CVE-2024-10918

Summary

Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.

Impact

If the library tries to reply to a Modbus request with unexpected length, then a buffer overflow occurs.

Issue Date

February 24, 2025

Affects

This issue affects libmodbus v3.1.10

CVE Name

CVE-2024-10918

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

CVSS Score

4.8

Solution

To fix this issue, it's suggested to update libmodbus to v3.1.11

Mitigations

Acknowledgements

Gabriele Quagliarella

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Threat Actor Activity Related to the Iran Conflict

Read

Fuzzing Protocol Implementations: 10 Vulnerabilities in the P-Net PROFINET Library

Read

Major Power Outage Hits Spain and Portugal: Spotlight on Critical Energy Infrastructure Vulnerabilities 

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.