Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-48794 | The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not. |
Solution
Affected Product Affected Software Version Corrected in Software Version Pavilion8® <V5.20 V6.0 and later Mitigations and Workarounds Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Workaround
No workaround given by the vendor.
Thu, 19 Sep 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:rockwellautomation:pavilion8:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Thu, 12 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation pavilion8 |
|
CPEs | cpe:2.3:a:rockwellautomation:pavilion8:-:*:*:*:*:*:*:* | |
Vendors & Products |
Rockwellautomation
Rockwellautomation pavilion8 |
|
Metrics |
ssvc
|
Thu, 12 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not. | |
Title | Rockwell Automation Incorrect Privileges and Path Traversal Vulnerability in Pavilion8® | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-09-12T20:49:51.544Z
Reserved: 2024-08-19T18:56:36.513Z
Link: CVE-2024-7960

Updated: 2024-09-12T20:49:45.879Z

Status : Analyzed
Published: 2024-09-12T21:15:03.153
Modified: 2024-09-19T01:52:55.193
Link: CVE-2024-7960

No data.

No data.