CVE-2024-8533
Sept. 19, 2024, 1:57 a.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
rockwellautomation |
|
|
Description
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
Weaknesses
CWE-269
Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
CWE ID: 269CWE-276
Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.
CWE ID: 276Date
Published: Sept. 12, 2024, 8:15 p.m.
Last Modified: Sept. 19, 2024, 1:57 a.m.
Source
PSIRT@rockwellautomation.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
o | rockwellautomation | 2800c_optixpanel_compact_firmware | / | / | / | / | / | / | / | / |
h | rockwellautomation | 2800c_optixpanel_compact | - | / | / | / | / | / | / | / |
o | rockwellautomation | 2800s_optixpanel_standard_firmware | / | / | / | / | / | / | / | / |
h | rockwellautomation | 2800s_optixpanel_standard | - | / | / | / | / | / | / | / |
o | rockwellautomation | embedded_edge_compute_module_firmware | / | / | / | / | / | / | / | / |
h | rockwellautomation | embedded_edge_compute_module | - | / | / | / | / | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
HIGHCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H