Description

RoboDK v5.5.4

is vulnerable to heap-based buffer overflow while processing a specific project file. The resulting memory corruption may crash the application.

Published: 2024-04-17
Score: 3.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

RoboDK did not respond to CISA's attempts at coordination. Users of RoboDK are encouraged to contact RoboDK and keep their systems up to date.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-16053 RoboDK v5.5.4 is vulnerable to heap-based buffer overflow while processing a specific project file. The resulting memory corruption may crash the application.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-20T15:52:19.013Z

Reserved: 2024-01-05T22:04:51.939Z

Link: CVE-2024-0257

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:16.231Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-17T20:15:07.407

Modified: 2024-11-21T08:46:09.897

Link: CVE-2024-0257

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T11:22:47Z

Weaknesses