Description
A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.
Published: 2025-01-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to V15.00 or apply patch in AID 1152309


Vendor Workaround

Control physical access to the system

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3727 A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.
History

Wed, 12 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Jan 2025 19:00:00 +0000

Type Values Removed Values Added
Description A Local Code Execution Vulnerability exists in the product and version listed above. The vulnerability is due to a default setting in Windows and allows access to the Command Prompt as a higher privileged user.
Title FactoryTalk® View Machine Edition - Local Code Injection
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-02-12T20:01:10.925Z

Reserved: 2025-01-21T21:21:03.342Z

Link: CVE-2025-24479

cve-icon Vulnrichment

Updated: 2025-02-12T19:52:50.253Z

cve-icon NVD

Status : Deferred

Published: 2025-01-28T19:15:14.910

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-24479

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses