PT-2024-38380 · Microchip Technology · Microchip Advanced Software Framework

Andrue Coombes

+1

·

Published

2024-08-08

·

Updated

2025-09-29

·

CVE-2024-7490

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Microchip Advanced Software Framework versions through 3.52.0.2574
Description The issue is related to an Improper Input Validation vulnerability in the Microchip Technology Advanced Software Framework example DHCP server, which can cause remote code execution through a buffer overflow. This vulnerability is associated with program files tinydhcpserver.C and program routines lwip dhcp find option. The vulnerability could be widespread, impacting Advanced Software Framework versions 3.52.0.2574 and earlier.
Recommendations Apply the provided workaround or migrate to an actively maintained framework, as the Advanced Software Framework is no longer being supported. As a temporary workaround, consider disabling the
lwip dhcp find option
routine until a patch is available. Restrict access to the vulnerable
tinydhcpserver.C
file to minimize the risk of exploitation. Avoid using the vulnerable DHCP server implementation in the Advanced Software Framework until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

RCE

Buffer Overflow

Weakness Enumeration

Related Identifiers

CVE-2024-7490

Affected Products

Microchip Advanced Software Framework