The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-38588 The specific API in HWATAIServiSign Windows Version from CHANGING Information Technology does not properly validate the length of server-side inputs. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the HWATAIServiSign, temporarily disrupting its service.
Fixes

Solution

Update to version 1.0.24.0219 or later.


Workaround

No workaround given by the vendor.

History

Fri, 09 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Changingtec
Changingtec hwatai Servisign
Weaknesses CWE-787
CPEs cpe:2.3:a:changingtec:hwatai_servisign:*:*:*:*:*:windows:*:*
Vendors & Products Changingtec
Changingtec hwatai Servisign

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-08-02T16:05:52.255Z

Reserved: 2024-07-09T03:30:54.517Z

Link: CVE-2024-40723

cve-icon Vulnrichment

Updated: 2024-08-02T16:05:49.102Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-02T11:16:43.520

Modified: 2024-08-09T14:44:01.907

Link: CVE-2024-40723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.