Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-14028: CWE-416 Use after free in Softing smartLink HW-DP

0
Medium
VulnerabilityCVE-2024-14028cvecve-2024-14028cwe-416
Published: Fri Mar 27 2026 (03/27/2026, 05:53:40 UTC)
Source: CVE Database V5
Vendor/Project: Softing
Product: smartLink HW-DP

Description

Use after free vulnerability in Softing smartLink HW-DP or smartLink HW-PN webserver allows HTTP DoS. This issue affects: smartLink HW-DP: through 1.31 smartLink HW-PN: before 1.02.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 06:16:59 UTC

Technical Analysis

CVE-2024-14028 is classified as a CWE-416 use-after-free vulnerability affecting the webserver components of Softing smartLink HW-DP (up to version 1.31) and smartLink HW-PN (before version 1.02). Use-after-free vulnerabilities occur when a program continues to use memory after it has been freed, potentially leading to undefined behavior such as crashes or memory corruption. In this case, the vulnerability allows an unauthenticated remote attacker to send specially crafted HTTP requests to the device's webserver, triggering the use-after-free condition. This results in a denial of service (DoS) by crashing or destabilizing the webserver, rendering the device unavailable. The vulnerability does not expose sensitive data or allow code execution but impacts availability. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) in the form of sending malicious HTTP requests. The vulnerability scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. The CVSS v3.1 score of 6.5 reflects a medium severity due to the ease of remote exploitation and the resulting service disruption. No patches or exploits are currently publicly available, but the issue is officially published and assigned by Softing. This vulnerability is particularly relevant for industrial and automation environments where these devices are deployed for communication and control purposes.

Potential Impact

The primary impact of CVE-2024-14028 is the disruption of availability of Softing smartLink HW-DP and HW-PN devices due to a remote denial of service condition. Organizations relying on these devices for industrial communication, automation, or network bridging may experience interruptions in operational processes, potentially affecting production lines, monitoring systems, or critical infrastructure. Although confidentiality and integrity are not directly compromised, the loss of availability can lead to operational downtime, increased maintenance costs, and potential safety risks in industrial environments. The ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments where these devices are exposed to untrusted networks. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details become widely known. Overall, the impact is moderate but significant for organizations dependent on continuous device availability.

Mitigation Recommendations

To mitigate CVE-2024-14028, organizations should first verify the firmware versions of their Softing smartLink HW-DP and HW-PN devices and upgrade to versions beyond 1.31 and 1.02 respectively once patches are released by Softing. Until patches are available, network-level mitigations should be implemented, including restricting access to the device webserver interfaces to trusted management networks only, using firewalls or network segmentation to block unauthorized HTTP traffic. Employing intrusion detection or prevention systems to monitor for anomalous HTTP requests targeting these devices can help detect exploitation attempts. Additionally, disabling or limiting webserver functionality if not required can reduce the attack surface. Regularly auditing device configurations and monitoring device availability will help identify potential exploitation attempts early. Coordinating with Softing support for updates and advisories is recommended to stay informed about patch releases and further mitigation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Softing
Date Reserved
2026-03-23T15:31:51.510Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c61cf33c064ed76f58580c

Added to database: 3/27/2026, 6:00:19 AM

Last enriched: 3/27/2026, 6:16:59 AM

Last updated: 3/28/2026, 1:23:32 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses