Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28286: n/a

0
High
VulnerabilityCVE-2024-28286cvecve-2024-28286
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In mz-automation libiec61850 v1.4.0, a NULL Pointer Dereference was detected in the mmsServer_handleFileCloseRequest.c function of src/mms/iso_mms/server/mms_file_service.c. The vulnerability manifests as SEGV and causes the application to crash

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:15:40 UTC

Technical Analysis

CVE-2024-28286 identifies a NULL Pointer Dereference vulnerability in the mz-automation libiec61850 library version 1.4.0, specifically within the function mmsServer_handleFileCloseRequest.c located in src/mms/iso_mms/server/mms_file_service.c. This vulnerability arises when the function improperly handles file close requests, leading to dereferencing a NULL pointer. The consequence is a segmentation fault (SEGV) that causes the application to crash, resulting in a denial of service (DoS). The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The flaw is categorized under CWE-476 (NULL Pointer Dereference), a common programming error that can destabilize software. The affected library, libiec61850, is widely used for IEC 61850 protocol implementations in industrial automation and control systems, which manage electrical substations and other critical infrastructure. Although no known exploits have been reported in the wild, the vulnerability's presence in critical communication software poses a risk of service disruption. No official patches or fixes have been released at the time of publication, necessitating proactive mitigation by users. The CVSS score of 7.5 reflects a high severity due to the ease of exploitation and the significant impact on availability, while confidentiality and integrity remain unaffected.

Potential Impact

The primary impact of CVE-2024-28286 is a denial of service condition caused by application crashes when handling specific file close requests. For organizations using mz-automation libiec61850 in industrial control systems, this can lead to interruption of critical communication channels that manage electrical substations, power grids, and other automation infrastructure. Such disruptions can degrade operational reliability, cause downtime, and potentially affect safety systems. Since the vulnerability can be triggered remotely without authentication, attackers could exploit it to disrupt services at scale. Although it does not compromise data confidentiality or integrity, the loss of availability in critical infrastructure environments can have cascading effects, including financial losses, regulatory penalties, and damage to public trust. The lack of known exploits reduces immediate risk, but the vulnerability's presence in widely deployed ICS protocols makes it a significant concern for industrial operators worldwide.

Mitigation Recommendations

Given the absence of official patches, organizations should implement the following mitigations: 1) Restrict network access to systems running mz-automation libiec61850 to trusted and monitored segments, employing network segmentation and firewall rules to limit exposure to untrusted networks. 2) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to IEC 61850 traffic to identify and block suspicious file close requests that could trigger the vulnerability. 3) Monitor application logs and system stability closely for signs of crashes or abnormal behavior related to MMS file service operations. 4) Engage with the vendor or open-source maintainers to obtain updates or patches as soon as they become available. 5) Consider temporary workarounds such as disabling or limiting the use of the vulnerable file close request functionality if feasible without disrupting critical operations. 6) Conduct thorough testing in controlled environments before deploying any updates or mitigations to avoid unintended service impact. 7) Maintain an incident response plan specifically addressing potential denial of service attacks targeting industrial communication protocols.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8cb7ef31ef0b5883a1

Added to database: 2/25/2026, 9:45:48 PM

Last enriched: 2/26/2026, 7:15:40 PM

Last updated: 4/12/2026, 3:38:17 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses