{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:02:55.736","vulnerabilities":[{"cve":{"id":"CVE-2024-24972","sourceIdentifier":"disclosures@gallagher.com","published":"2024-09-11T04:15:05.250","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer Copy without Checking Size of Input (CWE-120) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authorised and authenticated operator to reboot the Controller, causing a Denial of Service. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes.\n\nThis issue affects: Controller 6000 and Controller 7000 9.10 prior to vCR9.10.240816a (distributed in 9.10.1530 (MR2)), 9.00 prior to vCR9.00.240816a (distributed in 9.00.2168 (MR4)), 8.90 prior to vCR8.90.240816a (distributed in 8.90.2155 (MR5)), 8.80 prior to vCR8.80.240816b (distributed in 8.80.1938 (MR6)), all versions of 8.70 and prior."},{"lang":"es","value":"La copia de búfer sin comprobar el tamaño de la entrada (CWE-120) en la interfaz web de diagnóstico del Controller 6000 y el Controller 7000 permite que un operador autorizado y autenticado reinicie el Controller, lo que provoca una denegación de servicio. Gallagher recomienda que la página web de diagnóstico no esté habilitada (la opción predeterminada está desactivada) a menos que lo indique el soporte técnico de Gallagher. Esta interfaz está destinada únicamente a fines de diagnóstico. Este problema afecta a: Controller 6000 y Controller 7000 9.10 anterior a vCR9.10.240816a (distribuido en 9.10.1530 (MR2)), 9.00 anterior a vCR9.00.240816a (distribuido en 9.00.2168 (MR4)), 8.90 anterior a vCR8.90.240816a (distribuido en 8.90.2155 (MR5)), 8.80 anterior a vCR8.80.240816b (distribuido en 8.80.1938 (MR6)), todas las versiones de 8.70 y anteriores."}],"metrics":{"cvssMetricV31":[{"source":"disclosures@gallagher.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"disclosures@gallagher.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"references":[{"url":"https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-24972","source":"disclosures@gallagher.com"}]}}]}