Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45200: n/a

0
Medium
VulnerabilityCVE-2024-45200cvecve-2024-45200
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Nintendo Mario Kart 8 Deluxe before 3.0.3, the LAN/LDN local multiplayer implementation allows a remote attacker to exploit a stack-based buffer overflow upon deserialization of session information via a malformed browse-reply packet, aka KartLANPwn. The victim is not required to join a game session with an attacker. The victim must open the "Wireless Play" (or "LAN Play") menu from the game's title screen, and an attacker nearby (LDN) or on the same LAN network as the victim can send a crafted reply packet to the victim's console. This enables a remote attacker to obtain complete denial-of-service on the game's process, or potentially, remote code execution on the victim's console. The issue is caused by incorrect use of the Nintendo Pia library,

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:09:57 UTC

Technical Analysis

CVE-2024-45200 is a stack-based buffer overflow vulnerability discovered in Nintendo Mario Kart 8 Deluxe prior to version 3.0.3, specifically within the LAN/LDN local multiplayer implementation. The flaw arises from improper handling and deserialization of session information in browse-reply packets, which are used to discover and join multiplayer sessions over local networks. An attacker located on the same LAN or physically nearby (in the case of LDN) can send a specially crafted malformed browse-reply packet to a victim's console. The victim only needs to open the Wireless Play or LAN Play menu on the game’s title screen, which triggers the vulnerable code path. No further interaction, such as joining a game session, is necessary for exploitation. The vulnerability stems from incorrect use of the Nintendo Pia library, leading to a stack-based buffer overflow during packet processing. Successful exploitation can result in a complete denial-of-service (crashing the game process) or potentially remote code execution, allowing the attacker to run arbitrary code on the victim’s console. The CVSS 3.1 base score is 6.3, indicating medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts to confidentiality, integrity, and availability. No public exploits have been reported yet, and no official patches or updates have been linked at the time of publication. This vulnerability highlights risks in local multiplayer features that rely on network packet deserialization without sufficient input validation or memory safety checks.

Potential Impact

The primary impact of CVE-2024-45200 is on the availability and integrity of the Mario Kart 8 Deluxe game process on Nintendo Switch consoles. An attacker on the same LAN or physically nearby can cause the game to crash, resulting in denial-of-service and disruption of gameplay. More critically, the buffer overflow could allow remote code execution, which may enable an attacker to execute arbitrary code on the victim’s console. This could lead to unauthorized control over the device, potentially compromising user data, game integrity, or even broader system security depending on the console’s security architecture. Although exploitation requires network proximity and the victim opening the Wireless or LAN Play menu, the lack of need for user interaction beyond that and no privilege requirements lower the barrier to attack. For organizations or individuals using Nintendo Switch consoles in shared environments such as gaming cafes, tournaments, or LAN parties, this vulnerability could be leveraged to disrupt events or compromise devices. The absence of known exploits reduces immediate risk, but the potential for remote code execution elevates the threat if weaponized. Overall, the impact is significant for affected users but limited in scope to local network environments.

Mitigation Recommendations

To mitigate CVE-2024-45200, affected users should update Mario Kart 8 Deluxe to version 3.0.3 or later as soon as the patch becomes available from Nintendo. Until patched, users should avoid opening the Wireless Play or LAN Play menus in untrusted or public LAN environments to reduce exposure. Network administrators in environments with Nintendo Switch consoles should segment and isolate gaming devices on separate VLANs or subnets to limit LAN-based attack vectors. Employing network monitoring to detect anomalous or malformed browse-reply packets targeting Switch consoles can provide early warning of exploitation attempts. Additionally, Nintendo should review and improve input validation and memory safety in the Pia library and related multiplayer code to prevent similar deserialization vulnerabilities. Users should also disable local multiplayer features if not needed. For event organizers, ensuring consoles are updated and restricting network access during tournaments can reduce risk. Finally, educating users about the risks of local network attacks and encouraging cautious use of multiplayer menus can help mitigate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ceab7ef31ef0b56a32e

Added to database: 2/25/2026, 9:43:06 PM

Last enriched: 2/26/2026, 8:09:57 AM

Last updated: 4/12/2026, 1:22:35 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses