Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-36617 | A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system. |
Solution
AFFECTED PRODUCTS AND SOLUTION Affected Product First Known in software version Corrected in software version FactoryTalk® View SE V12.0 v14 Mitigations and Workarounds Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * Use the Secure Install option when installing FactoryTalk® Services Platform. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Fri, 31 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-02T03:50:56.129Z
Reserved: 2024-06-06T20:18:27.551Z
Link: CVE-2024-37369

Updated: 2024-06-14T18:12:56.409Z

Status : Analyzed
Published: 2024-06-14T17:15:51.310
Modified: 2025-01-31T15:45:19.597
Link: CVE-2024-37369

No data.

No data.