Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-48091 | If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack. |
Solution
AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users with the affected product versions should apply security updates as soon as possible. All impacted products and affected versions can be fixed by installing SuiteLink v3.7.100 https://softwaresupportsp.aveva.com/#/producthub/details . AVEVA recommends the following general defensive measures: * Apply Host and/or Network firewall rules restricting the SuiteLink server to accept traffic only from trusted source(s). By default, SuiteLink listens on port 5413. For more information, see AVEVA's Security Bulletin AVEVA-2024-007 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-007.pdf .
Workaround
No workaround given by the vendor.
Thu, 15 Aug 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack. | |
| Title | Allocation of Resources Without Limits or Throttling in AVEVA SuiteLink Server | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-15T18:49:01.175Z
Reserved: 2024-07-25T17:56:01.265Z
Link: CVE-2024-7113
Updated: 2024-08-15T18:48:55.514Z
Status : Awaiting Analysis
Published: 2024-08-13T17:15:24.653
Modified: 2024-08-14T02:07:05.410
Link: CVE-2024-7113
No data.
OpenCVE Enrichment
No data.
EUVD