A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19521 | A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable. |
Solution
* Update to v2.74 or later. * Customers using the affected software are encouraged to apply the risk mitigations, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Wed, 11 Dec 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rockwellautomation
Rockwellautomation factorytalk Services Platform |
|
| CPEs | cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rockwellautomation
Rockwellautomation factorytalk Services Platform |
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-28T16:49:41.429Z
Reserved: 2024-01-03T16:40:50.367Z
Link: CVE-2024-21915
Updated: 2024-08-01T22:35:34.363Z
Status : Analyzed
Published: 2024-02-16T19:15:08.460
Modified: 2024-12-11T19:31:28.200
Link: CVE-2024-21915
No data.
OpenCVE Enrichment
No data.
EUVD