In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19463 In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

History

Fri, 08 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-11-08T15:44:25.848Z

Reserved: 2024-01-05T21:39:05.402Z

Link: CVE-2024-21852

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:36.314Z

cve-icon NVD

Status : Modified

Published: 2024-02-01T23:15:10.730

Modified: 2024-11-21T08:55:07.547

Link: CVE-2024-21852

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.