Multiple PT switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack.
This vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation.
The Identified Vulnerability Type and Potential Impact
Item |
Vulnerability Type |
Impact |
1 |
Out-of-bounds Write (CWE-787)
CVE-2024-7695
|
An out-of-bounds write vulnerability caused by insufficient input validation allows attackers to overwrite memory beyond the buffer’s bounds. Successful exploitation of this vulnerability could lead to a denial-of-service (DoS) condition, disrupting normal operations. |
Vulnerability Scoring Details
ID
|
Base Score
|
Vector
|
Severity |
Unauthenticated
Remote Exploits
|
CVE-2024-7695 |
CVSS 3.1: 7.5
|
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
High |
Yes |
CVSS 4.0: 8.7 |
AV:N/AC:L/AT:N/PR:N/UI:N/
VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
|
Note: This advisory uses CVSS 3.1 as the standard for determining severity levels. CVSS 4.0 is provided as a reference metric for comparison.