Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-44218 | A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime. |
Solution
* Corrected in v11,12, 13 and later. * Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Thu, 30 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation factorytalk View |
|
Weaknesses | CWE-89 | |
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
Vendors & Products |
Rockwellautomation
Rockwellautomation factorytalk View |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-01T20:47:41.128Z
Reserved: 2024-05-07T14:56:25.894Z
Link: CVE-2024-4609

Updated: 2024-08-01T20:47:41.128Z

Status : Analyzed
Published: 2024-05-16T16:15:10.750
Modified: 2025-01-30T15:50:28.557
Link: CVE-2024-4609

No data.

No data.