Description
A directory path traversal vulnerability exists when loading a vsmodel file in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .vsmodel file. This vulnerability affects VeriStand 2024 Q2 and prior versions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47820 | A directory path traversal vulnerability exists when loading a vsmodel file in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .vsmodel file. This vulnerability affects VeriStand 2024 Q2 and prior versions. |
References
History
Tue, 17 Sep 2024 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ni
Ni veristand |
|
| CPEs | cpe:2.3:a:ni:veristand:*:*:*:*:*:*:*:* cpe:2.3:a:ni:veristand:2024:q2:*:*:*:*:*:* |
|
| Vendors & Products |
Ni
Ni veristand |
Status: PUBLISHED
Assigner: NI
Published:
Updated: 2024-08-01T21:45:38.049Z
Reserved: 2024-07-16T14:19:50.444Z
Link: CVE-2024-6791
Updated: 2024-08-01T21:45:38.049Z
Status : Modified
Published: 2024-07-22T21:15:04.360
Modified: 2024-11-21T09:50:20.043
Link: CVE-2024-6791
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD