In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19692 In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.
Fixes

Solution

No solution given by the vendor.


Workaround

Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.

History

Fri, 09 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-05-09T19:00:04.477Z

Reserved: 2024-01-05T21:39:05.410Z

Link: CVE-2024-22096

cve-icon Vulnrichment

Updated: 2024-08-01T22:35:34.809Z

cve-icon NVD

Status : Modified

Published: 2024-02-02T00:15:55.713

Modified: 2024-11-21T08:55:34.197

Link: CVE-2024-22096

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.