Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6198: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in ViaSat RM4100

0
High
VulnerabilityCVE-2024-6198cvecve-2024-6198cwe-120
Published: Fri Apr 25 2025 (04/25/2025, 13:02:43 UTC)
Source: CVE
Vendor/Project: ViaSat
Product: RM4100

Description

The device exposes a web interface on ports TCP/3030 and TCP/9882. This web service runs lighttpd, which implements the “SNORE” interface. This interface is affected by a stack buffer overflow vulnerability due to insecure path parsing. An attacker with access to the LAN network interface could use a specially crafted HTTP request to exploit a buffer overflow on the modem.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:27:14 UTC

Technical Analysis

CVE-2024-6198 is a stack-based buffer overflow vulnerability identified in the ViaSat RM4100 modem, specifically affecting its embedded web interface that listens on TCP ports 3030 and 9882. This interface runs the lighttpd web server implementing the SNORE interface, which suffers from insecure path parsing. The vulnerability stems from improper bounds checking during buffer copy operations (CWE-120), allowing an attacker with access to the local area network (LAN) to craft malicious HTTP requests that overflow a stack buffer. This overflow can corrupt memory, potentially enabling remote code execution or causing denial of service conditions. The attack vector requires network-level access to the LAN interface, and the attack complexity is high due to the need for precise request crafting. No authentication or user interaction is required, increasing the risk once the attacker is on the LAN. The CVSS v4.0 base score is 7.7 (high), reflecting the significant impact on confidentiality, integrity, and availability, but mitigated somewhat by the access and complexity requirements. As of the publication date, no patches or known exploits are publicly available, but the vulnerability is recognized by CISA and assigned the CWE-120 classification. This vulnerability poses a critical risk to organizations relying on ViaSat RM4100 devices for satellite internet connectivity, especially in environments where LAN access controls are weak or compromised.

Potential Impact

The potential impact of CVE-2024-6198 is substantial for organizations using ViaSat RM4100 modems. Exploitation could allow attackers to execute arbitrary code on the device, leading to full compromise of the modem. This could result in interception or manipulation of network traffic, disruption of internet connectivity, or pivoting to internal networks, severely affecting confidentiality, integrity, and availability. Given the modem's role as a critical network gateway, a successful attack could disrupt business operations, degrade service availability, and expose sensitive data. The requirement for LAN access limits remote exploitation but does not eliminate risk in environments where internal network security is weak or where attackers have gained footholds. The absence of patches increases exposure time, and the lack of known exploits suggests a window for proactive mitigation. Overall, the threat is significant for satellite internet users, government agencies, critical infrastructure providers, and enterprises relying on ViaSat technology.

Mitigation Recommendations

1. Restrict LAN access to the ViaSat RM4100 modem's web interface by implementing strict network segmentation and firewall rules to limit which devices can communicate on TCP ports 3030 and 9882. 2. Monitor network traffic for unusual or malformed HTTP requests targeting these ports, employing intrusion detection systems (IDS) with signatures for buffer overflow attempts. 3. Disable or restrict the SNORE interface if it is not required for operational purposes to reduce the attack surface. 4. Apply network access control (NAC) solutions to prevent unauthorized devices from connecting to the LAN segment hosting the modem. 5. Engage with ViaSat support channels to obtain firmware updates or patches as they become available and plan for timely deployment. 6. Conduct regular security audits and penetration testing focused on internal network devices to identify and remediate potential access vectors. 7. Educate network administrators about the vulnerability and enforce strict administrative access policies to prevent lateral movement within the LAN. These measures go beyond generic advice by focusing on network-level controls and proactive monitoring specific to the affected services and ports.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ONEKEY
Date Reserved
2024-06-20T09:18:03.225Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd88de

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 2/26/2026, 8:27:14 PM

Last updated: 3/25/2026, 1:35:29 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses