CVE-2024-2637

May 14, 2024, 7:17 p.m.

7.2
High

Description

An authenticated local attacker who successfully exploited this vulnerability could insert and run arbitrary code using legitimate B&R software's. An Uncontrolled Search Path Element vulnerability in B&R Industrial Automation Scene Viewer, B&R Industrial  Automation Runtime, B&R Industrial Automation mapp Vision, B&R Industrial Automation mapp View, B&R Industrial Automation mapp Cockpit, B&R Industrial Automation mapp Safety, B&R Industrial Automation VC4 could allow an authenticated local attacker to execute malicious code by placing specially crafted files in the loading search path. This issue affects Scene Viewer: before 4.4.0; Automation Runtime: before J4.93; mapp Vision: before 5.26.1; mapp View: before 5.24.2; mapp Cockpit: before 5.24.2; mapp Safety: before 5.24.2; VC4: before 4.73.2.

Product(s) Impacted

Product Versions
B&R Industrial Automation Scene Viewer
  • before 4.4.0
B&R Industrial Automation Automation Runtime
  • before J4.93
B&R Industrial Automation mapp Vision
  • before 5.26.1
B&R Industrial Automation mapp View
  • before 5.24.2
B&R Industrial Automation mapp Cockpit
  • before 5.24.2
B&R Industrial Automation mapp Safety
  • before 5.24.2
B&R Industrial Automation VC4
  • before 4.73.2

Weaknesses

Common security weaknesses mapped to this vulnerability.

CVSS Score

7.2 / 10

CVSS Data - 3.1

  • Attack Vector: LOCAL
  • Attack Complexity: HIGH
  • Privileges Required: HIGH
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

    View Vector String

Timeline

Published: May 14, 2024, 7:15 p.m.
Last Modified: May 14, 2024, 7:17 p.m.

Status : Awaiting Analysis

CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.

More info

Source

cybersecurity@ch.abb.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.