If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-48091 If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.
Fixes

Solution

AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users with the affected product versions should apply security updates as soon as possible. All impacted products and affected versions can be fixed by installing SuiteLink v3.7.100 https://softwaresupportsp.aveva.com/#/producthub/details . AVEVA recommends the following general defensive measures: * Apply Host and/or Network firewall rules restricting the SuiteLink server to accept traffic only from trusted source(s). By default, SuiteLink listens on port 5413. For more information, see AVEVA's Security Bulletin AVEVA-2024-007 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-007.pdf .


Workaround

No workaround given by the vendor.

History

Thu, 15 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 16:30:00 +0000

Type Values Removed Values Added
Description If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.
Title Allocation of Resources Without Limits or Throttling in AVEVA SuiteLink Server
Weaknesses CWE-770
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-15T18:49:01.175Z

Reserved: 2024-07-25T17:56:01.265Z

Link: CVE-2024-7113

cve-icon Vulnrichment

Updated: 2024-08-15T18:48:55.514Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-13T17:15:24.653

Modified: 2024-08-14T02:07:05.410

Link: CVE-2024-7113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.