A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36616 A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.
Fixes

Solution

* Corrected in software version v14.0. * Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.    * It is recommended that users enforce proper access controls within the network and segment networks containing sensitive information using IPSec: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1090456 * Security Best Practice https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight s


Workaround

No workaround given by the vendor.

History

Fri, 31 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CPEs cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-02T03:50:56.219Z

Reserved: 2024-06-06T20:18:27.551Z

Link: CVE-2024-37368

cve-icon Vulnrichment

Updated: 2024-06-18T16:33:00.957Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-14T15:15:52.100

Modified: 2025-01-31T15:44:29.627

Link: CVE-2024-37368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.