A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36617 A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system.
Fixes

Solution

AFFECTED PRODUCTS AND SOLUTION     Affected Product         First Known in software version         Corrected in software version         FactoryTalk® View SE         V12.0         v14   Mitigations and Workarounds Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.    * Use the Secure Install option when installing FactoryTalk® Services Platform. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight


Workaround

No workaround given by the vendor.

History

Fri, 31 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-02T03:50:56.129Z

Reserved: 2024-06-06T20:18:27.551Z

Link: CVE-2024-37369

cve-icon Vulnrichment

Updated: 2024-06-14T18:12:56.409Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-14T17:15:51.310

Modified: 2025-01-31T15:45:19.597

Link: CVE-2024-37369

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.