CVE-2024-45200: n/a
CVE-2024-45200 is a medium-severity stack-based buffer overflow vulnerability in Nintendo Mario Kart 8 Deluxe versions before 3. 0. 3. It affects the LAN/LDN local multiplayer feature, allowing a remote attacker on the same LAN or nearby (for LDN) to send a crafted browse-reply packet that triggers the overflow during deserialization of session information. The victim only needs to open the Wireless Play or LAN Play menu; no game session joining or user interaction beyond opening the menu is required. Exploitation can cause denial-of-service of the game process or potentially remote code execution on the victim's console. The root cause is improper use of the Nintendo Pia library. No known exploits are currently in the wild, and the CVSS 3. 1 score is 6. 3, reflecting medium severity with network attack vector, no privileges or user interaction required, and impacts to confidentiality, integrity, and availability.
AI Analysis
Technical Summary
CVE-2024-45200 is a stack-based buffer overflow vulnerability discovered in Nintendo Mario Kart 8 Deluxe prior to version 3.0.3, specifically within the LAN/LDN local multiplayer implementation. The flaw arises from improper handling and deserialization of session information in browse-reply packets, which are used to discover and join multiplayer sessions over local networks. An attacker located on the same LAN or physically nearby (in the case of LDN) can send a specially crafted malformed browse-reply packet to a victim's console. The victim only needs to open the Wireless Play or LAN Play menu on the game’s title screen, which triggers the vulnerable code path. No further interaction, such as joining a game session, is necessary for exploitation. The vulnerability stems from incorrect use of the Nintendo Pia library, leading to a stack-based buffer overflow during packet processing. Successful exploitation can result in a complete denial-of-service (crashing the game process) or potentially remote code execution, allowing the attacker to run arbitrary code on the victim’s console. The CVSS 3.1 base score is 6.3, indicating medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts to confidentiality, integrity, and availability. No public exploits have been reported yet, and no official patches or updates have been linked at the time of publication. This vulnerability highlights risks in local multiplayer features that rely on network packet deserialization without sufficient input validation or memory safety checks.
Potential Impact
The primary impact of CVE-2024-45200 is on the availability and integrity of the Mario Kart 8 Deluxe game process on Nintendo Switch consoles. An attacker on the same LAN or physically nearby can cause the game to crash, resulting in denial-of-service and disruption of gameplay. More critically, the buffer overflow could allow remote code execution, which may enable an attacker to execute arbitrary code on the victim’s console. This could lead to unauthorized control over the device, potentially compromising user data, game integrity, or even broader system security depending on the console’s security architecture. Although exploitation requires network proximity and the victim opening the Wireless or LAN Play menu, the lack of need for user interaction beyond that and no privilege requirements lower the barrier to attack. For organizations or individuals using Nintendo Switch consoles in shared environments such as gaming cafes, tournaments, or LAN parties, this vulnerability could be leveraged to disrupt events or compromise devices. The absence of known exploits reduces immediate risk, but the potential for remote code execution elevates the threat if weaponized. Overall, the impact is significant for affected users but limited in scope to local network environments.
Mitigation Recommendations
To mitigate CVE-2024-45200, affected users should update Mario Kart 8 Deluxe to version 3.0.3 or later as soon as the patch becomes available from Nintendo. Until patched, users should avoid opening the Wireless Play or LAN Play menus in untrusted or public LAN environments to reduce exposure. Network administrators in environments with Nintendo Switch consoles should segment and isolate gaming devices on separate VLANs or subnets to limit LAN-based attack vectors. Employing network monitoring to detect anomalous or malformed browse-reply packets targeting Switch consoles can provide early warning of exploitation attempts. Additionally, Nintendo should review and improve input validation and memory safety in the Pia library and related multiplayer code to prevent similar deserialization vulnerabilities. Users should also disable local multiplayer features if not needed. For event organizers, ensuring consoles are updated and restricting network access during tournaments can reduce risk. Finally, educating users about the risks of local network attacks and encouraging cautious use of multiplayer menus can help mitigate exploitation.
Affected Countries
United States, Japan, Germany, United Kingdom, Canada, France, Australia, South Korea, Brazil, Mexico
CVE-2024-45200: n/a
Description
CVE-2024-45200 is a medium-severity stack-based buffer overflow vulnerability in Nintendo Mario Kart 8 Deluxe versions before 3. 0. 3. It affects the LAN/LDN local multiplayer feature, allowing a remote attacker on the same LAN or nearby (for LDN) to send a crafted browse-reply packet that triggers the overflow during deserialization of session information. The victim only needs to open the Wireless Play or LAN Play menu; no game session joining or user interaction beyond opening the menu is required. Exploitation can cause denial-of-service of the game process or potentially remote code execution on the victim's console. The root cause is improper use of the Nintendo Pia library. No known exploits are currently in the wild, and the CVSS 3. 1 score is 6. 3, reflecting medium severity with network attack vector, no privileges or user interaction required, and impacts to confidentiality, integrity, and availability.
AI-Powered Analysis
Technical Analysis
CVE-2024-45200 is a stack-based buffer overflow vulnerability discovered in Nintendo Mario Kart 8 Deluxe prior to version 3.0.3, specifically within the LAN/LDN local multiplayer implementation. The flaw arises from improper handling and deserialization of session information in browse-reply packets, which are used to discover and join multiplayer sessions over local networks. An attacker located on the same LAN or physically nearby (in the case of LDN) can send a specially crafted malformed browse-reply packet to a victim's console. The victim only needs to open the Wireless Play or LAN Play menu on the game’s title screen, which triggers the vulnerable code path. No further interaction, such as joining a game session, is necessary for exploitation. The vulnerability stems from incorrect use of the Nintendo Pia library, leading to a stack-based buffer overflow during packet processing. Successful exploitation can result in a complete denial-of-service (crashing the game process) or potentially remote code execution, allowing the attacker to run arbitrary code on the victim’s console. The CVSS 3.1 base score is 6.3, indicating medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts to confidentiality, integrity, and availability. No public exploits have been reported yet, and no official patches or updates have been linked at the time of publication. This vulnerability highlights risks in local multiplayer features that rely on network packet deserialization without sufficient input validation or memory safety checks.
Potential Impact
The primary impact of CVE-2024-45200 is on the availability and integrity of the Mario Kart 8 Deluxe game process on Nintendo Switch consoles. An attacker on the same LAN or physically nearby can cause the game to crash, resulting in denial-of-service and disruption of gameplay. More critically, the buffer overflow could allow remote code execution, which may enable an attacker to execute arbitrary code on the victim’s console. This could lead to unauthorized control over the device, potentially compromising user data, game integrity, or even broader system security depending on the console’s security architecture. Although exploitation requires network proximity and the victim opening the Wireless or LAN Play menu, the lack of need for user interaction beyond that and no privilege requirements lower the barrier to attack. For organizations or individuals using Nintendo Switch consoles in shared environments such as gaming cafes, tournaments, or LAN parties, this vulnerability could be leveraged to disrupt events or compromise devices. The absence of known exploits reduces immediate risk, but the potential for remote code execution elevates the threat if weaponized. Overall, the impact is significant for affected users but limited in scope to local network environments.
Mitigation Recommendations
To mitigate CVE-2024-45200, affected users should update Mario Kart 8 Deluxe to version 3.0.3 or later as soon as the patch becomes available from Nintendo. Until patched, users should avoid opening the Wireless Play or LAN Play menus in untrusted or public LAN environments to reduce exposure. Network administrators in environments with Nintendo Switch consoles should segment and isolate gaming devices on separate VLANs or subnets to limit LAN-based attack vectors. Employing network monitoring to detect anomalous or malformed browse-reply packets targeting Switch consoles can provide early warning of exploitation attempts. Additionally, Nintendo should review and improve input validation and memory safety in the Pia library and related multiplayer code to prevent similar deserialization vulnerabilities. Users should also disable local multiplayer features if not needed. For event organizers, ensuring consoles are updated and restricting network access during tournaments can reduce risk. Finally, educating users about the risks of local network attacks and encouraging cautious use of multiplayer menus can help mitigate exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ceab7ef31ef0b56a32e
Added to database: 2/25/2026, 9:43:06 PM
Last enriched: 2/26/2026, 8:09:57 AM
Last updated: 2/26/2026, 8:55:23 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.