Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11798: CWE-787: Out-of-bounds Write in Fuji Electric Monitouch V-SFT

0
High
VulnerabilityCVE-2024-11798cvecve-2024-11798cwe-787
Published: Wed Nov 27 2024 (11/27/2024, 23:34:53 UTC)
Source: CVE Database V5
Vendor/Project: Fuji Electric
Product: Monitouch V-SFT

Description

CVE-2024-11798 is a high-severity remote code execution vulnerability in Fuji Electric Monitouch V-SFT version 6. 2. 3. 0. It arises from an out-of-bounds write during the parsing of X1 files due to improper validation of user-supplied data. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious webpage. Successful exploitation allows attackers to execute arbitrary code with the privileges of the current process, potentially compromising confidentiality, integrity, and availability. No known exploits are currently in the wild. The vulnerability has a CVSS score of 7. 8, reflecting its significant risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:41:36 UTC

Technical Analysis

CVE-2024-11798 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting Fuji Electric Monitouch V-SFT version 6.2.3.0. The flaw exists in the X1 file parsing component where insufficient validation of user-supplied data leads to a write operation beyond the allocated buffer boundaries. This memory corruption can be exploited remotely by an attacker who convinces a user to open a specially crafted malicious file or visit a malicious webpage containing such a file. The out-of-bounds write can overwrite critical memory structures, enabling the attacker to execute arbitrary code within the context of the Monitouch V-SFT process. Since the vulnerability requires user interaction but no prior authentication, it poses a significant risk especially in environments where users may be exposed to untrusted files or web content. The vulnerability was assigned CVE-2024-11798 and reported by the Zero Day Initiative (ZDI) as ZDI-CAN-24663. The CVSS v3.0 base score is 7.8, indicating high severity with high impact on confidentiality, integrity, and availability. Currently, no public exploit code or active exploitation has been reported. The affected product is commonly used in industrial automation and monitoring systems, which are critical infrastructure components. Lack of a patch at the time of disclosure necessitates immediate mitigation efforts to reduce attack surface and exposure.

Potential Impact

The impact of CVE-2024-11798 is substantial for organizations using Fuji Electric Monitouch V-SFT, particularly in industrial control systems (ICS) and manufacturing environments. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized control over monitoring and control processes, data theft, manipulation of operational parameters, or disruption of industrial operations. Given the critical nature of industrial environments, such compromise could lead to safety hazards, production downtime, financial losses, and damage to physical infrastructure. The requirement for user interaction limits mass exploitation but targeted attacks against industrial operators or supply chain partners remain a significant threat. The vulnerability affects confidentiality, integrity, and availability of affected systems, making it a critical concern for operational technology (OT) security. Organizations lacking timely mitigation may face increased risk of ransomware, sabotage, or espionage campaigns leveraging this flaw.

Mitigation Recommendations

Until an official patch is released by Fuji Electric, organizations should implement several specific mitigations: 1) Restrict and monitor the handling of X1 files by limiting file sources to trusted origins only and blocking or quarantining files from unverified sources. 2) Educate users about the risks of opening unsolicited or suspicious files and visiting untrusted websites, emphasizing the need for caution with X1 files. 3) Employ network segmentation to isolate Monitouch V-SFT systems from general user networks and the internet, reducing exposure to malicious content. 4) Use application whitelisting and endpoint protection solutions capable of detecting anomalous behavior or memory corruption attempts within Monitouch V-SFT processes. 5) Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 6) Prepare incident response plans specific to industrial control environments to rapidly contain and remediate any compromise. 7) Regularly check for updates from Fuji Electric and apply patches immediately upon availability. These targeted measures go beyond generic advice by focusing on the specific attack vector (X1 file parsing) and operational context of the affected product.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-26T16:02:25.786Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e1fb7ef31ef0b5965b9

Added to database: 2/25/2026, 9:48:15 PM

Last enriched: 2/26/2026, 5:41:36 AM

Last updated: 2/26/2026, 7:40:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats