A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-47535 A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
Fixes

Solution

Upgrade to v6.0


Workaround

Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.    * Limit access to only users who need it.   * Periodically review user access and privileges to confirm accuracy.   * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight

History

Fri, 02 May 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Jan 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation pavilion8
CPEs cpe:2.3:a:rockwellautomation:pavilion8:5.15.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.15.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.16.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.17.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.17.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.20.00:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation pavilion8
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-08-27T20:42:59.974Z

Reserved: 2024-07-01T21:06:41.384Z

Link: CVE-2024-6435

cve-icon Vulnrichment

Updated: 2024-08-01T21:41:03.349Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-16T13:15:13.630

Modified: 2025-01-31T15:01:23.807

Link: CVE-2024-6435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.