A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
Fixes

Solution

Affected Products Affected firmware revision Corrected in firmware revision PM1k 1408-BC3A-485 <4.020 4.020 PM1k 1408-BC3A-ENT <4.020 4.020 PM1k 1408-TS3A-485 <4.020 4.020 PM1k 1408-TS3A-ENT <4.020 4.020 PM1k 1408-EM3A-485 <4.020 4.020 PM1k 1408-EM3A-ENT <4.020 4.020 PM1k 1408-TR1A-485 <4.020 4.020 PM1k 1408-TR2A-485 <4.020 4.020 PM1k 1408-EM1A-485 <4.020 4.020 PM1k 1408-EM2A-485 <4.020 4.020 PM1k 1408-TR1A-ENT <4.020 4.020 PM1k 1408-TR2A-ENT <4.020 4.020 PM1k 1408-EM1A-ENT <4.020 4.020 PM1k 1408-EM2A-ENT <4.020 4.020 Mitigations and Workarounds Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.   ·       Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00102}

epss

{'score': 0.0011}


Wed, 18 Dec 2024 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
Title Rockwell Automation PowerMonitor™ 1000 Remote Code Execution
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-12-18T19:59:35.810Z

Reserved: 2024-12-09T17:50:47.624Z

Link: CVE-2024-12371

cve-icon Vulnrichment

Updated: 2024-12-18T19:59:30.365Z

cve-icon NVD

Status : Received

Published: 2024-12-18T16:15:10.907

Modified: 2024-12-18T20:15:21.193

Link: CVE-2024-12371

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.