In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-19463 | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution. |
Fixes
Solution
No solution given by the vendor.
Workaround
Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.
References
History
Fri, 08 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-11-08T15:44:25.848Z
Reserved: 2024-01-05T21:39:05.402Z
Link: CVE-2024-21852

Updated: 2024-08-01T22:27:36.314Z

Status : Modified
Published: 2024-02-01T23:15:10.730
Modified: 2024-11-21T08:55:07.547
Link: CVE-2024-21852

No data.

No data.