Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-36616 | A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification. |
Solution
* Corrected in software version v14.0. * Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * It is recommended that users enforce proper access controls within the network and segment networks containing sensitive information using IPSec: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1090456 * Security Best Practice https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight s
Workaround
No workaround given by the vendor.
Fri, 31 Jan 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-02T03:50:56.219Z
Reserved: 2024-06-06T20:18:27.551Z
Link: CVE-2024-37368

Updated: 2024-06-18T16:33:00.957Z

Status : Analyzed
Published: 2024-06-14T15:15:52.100
Modified: 2025-01-31T15:44:29.627
Link: CVE-2024-37368

No data.

No data.