Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24976: CWE-130: Improper Handling of Length Parameter Inconsistency in Open Automation Software OAS Platform

0
Medium
VulnerabilityCVE-2024-24976cvecve-2024-24976cwe-130
Published: Wed Apr 03 2024 (04/03/2024, 13:55:03 UTC)
Source: CVE Database V5
Vendor/Project: Open Automation Software
Product: OAS Platform

Description

A denial of service vulnerability exists in the OAS Engine File Data Source Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:00:38 UTC

Technical Analysis

CVE-2024-24976 is a vulnerability classified under CWE-130, which relates to improper handling of length parameter inconsistencies. The flaw exists in the OAS Engine File Data Source Configuration component of Open Automation Software's OAS Platform version 19.00.0057. Specifically, the vulnerability can be triggered by sending a specially crafted sequence of network requests that exploit the improper validation or handling of length parameters within the data source configuration process. This leads to the running program unexpectedly stopping, effectively causing a denial of service (DoS). The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), but it demands that the attacker has high privileges (PR:H) on the system, and no user interaction (UI:N) is needed. The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. The CVSS v3.1 base score is 4.9, reflecting a medium severity level. No known exploits have been reported in the wild, and no patches have been released at the time of publication. The vulnerability could disrupt critical automation processes relying on the OAS Platform, potentially causing operational downtime. The root cause is related to improper length parameter validation, which may cause buffer or memory handling errors leading to service crashes.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that utilize the OAS Platform version 19.00.0057, this vulnerability poses a risk of denial of service. The disruption of the OAS Engine could halt data collection, monitoring, and control functions, potentially leading to operational downtime and safety risks. Since the vulnerability requires high privileges, insider threats or compromised administrative accounts could be leveraged to exploit this issue. The impact is primarily on availability, which in industrial contexts can translate to production delays, financial losses, and safety hazards. Given the reliance on automation software in European manufacturing hubs, the potential for operational disruption is significant. However, the lack of known exploits and the requirement for elevated privileges somewhat limit immediate widespread impact. Organizations with remote or network-exposed OAS Platform instances are at higher risk. The absence of patches means mitigation must rely on network and access controls until vendor fixes are available.

Mitigation Recommendations

1. Restrict network access to the OAS Platform management interfaces to trusted administrative hosts only, using firewalls and network segmentation. 2. Enforce strict access controls and monitor administrative accounts to prevent unauthorized privilege escalation or misuse. 3. Implement network intrusion detection systems (NIDS) to detect anomalous sequences of requests targeting the OAS Engine File Data Source Configuration functionality. 4. Regularly audit and review logs for unusual activity indicative of attempts to exploit this vulnerability. 5. Maintain up-to-date backups and recovery procedures to minimize downtime in case of service disruption. 6. Engage with Open Automation Software for timely updates and apply patches immediately once released. 7. Consider deploying application-layer gateways or proxies that can validate and sanitize incoming requests to the OAS Platform. 8. Train operational technology (OT) security teams on this vulnerability to enhance detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-02-21T15:12:02.582Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475d6d939959c8022d68

Added to database: 11/4/2025, 6:35:09 PM

Last enriched: 11/4/2025, 7:00:38 PM

Last updated: 11/5/2025, 1:50:24 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats