Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19463 | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution. |
Solution
No solution given by the vendor.
Workaround
Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.
Fri, 08 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-11-08T15:44:25.848Z
Reserved: 2024-01-05T21:39:05.402Z
Link: CVE-2024-21852
Updated: 2024-08-01T22:27:36.314Z
Status : Modified
Published: 2024-02-01T23:15:10.730
Modified: 2024-11-21T08:55:07.547
Link: CVE-2024-21852
No data.
OpenCVE Enrichment
No data.
EUVD