A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-19521 | A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable. |
Solution
* Update to v2.74 or later. * Customers using the affected software are encouraged to apply the risk mitigations, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Wed, 11 Dec 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation factorytalk Services Platform |
|
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation
Rockwellautomation factorytalk Services Platform |

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-28T16:49:41.429Z
Reserved: 2024-01-03T16:40:50.367Z
Link: CVE-2024-21915

Updated: 2024-08-01T22:35:34.363Z

Status : Analyzed
Published: 2024-02-16T19:15:08.460
Modified: 2024-12-11T19:31:28.200
Link: CVE-2024-21915

No data.

No data.