Stack-based Buffer Overflow in libmodbus library

CVE-2024-10918

Summary

Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an unexpected length.

Impact

If the library tries to reply to a Modbus request with unexpected length, then a buffer overflow occurs.

Issue Date

February 24, 2025

Affects

This issue affects libmodbus v3.1.10

CVE Name

CVE-2024-10918

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

CVSS Score

4.8

Solution

To fix this issue, it's suggested to update libmodbus to v3.1.11

Mitigations

Acknowledgements

Gabriele Quagliarella

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Detecting New OT Threats: How To Do It Proactively 

Read

Smile, You’re Being Hacked: Nozomi Networks Labs Finds Five New Flaws in Hanwha Wisenet Cameras

Read

Breaking the Encryption: Analyzing the AutomationDirect CLICK Plus PLC Protocol 

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.