A vulnerability classified as critical has been found in Real Time Logic SharkSSL up to 09.09.24. This affects an unknown part of the component TLS Client Key Exchange Message Handler. The manipulation leads to heap-based buffer overflow.
This vulnerability is uniquely identified as CVE-2024-48075. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.