A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-19521 A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.
Fixes

Solution

* Update to v2.74 or later. * Customers using the affected software are encouraged to apply the risk mitigations, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight


Workaround

No workaround given by the vendor.

History

Wed, 11 Dec 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation factorytalk Services Platform
CPEs cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation factorytalk Services Platform

cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-28T16:49:41.429Z

Reserved: 2024-01-03T16:40:50.367Z

Link: CVE-2024-21915

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.363Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-16T19:15:08.460

Modified: 2024-12-11T19:31:28.200

Link: CVE-2024-21915

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.