Show filters
40 Total Results
Displaying 11-20 of 40
Sort by:
Attacker Value
Unknown
CVE-2024-12672
Disclosure Date: December 19, 2024 (last updated December 20, 2024)
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown
CVE-2024-12373
Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.
0
Attacker Value
Unknown
CVE-2024-12372
Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
0
Attacker Value
Unknown
CVE-2024-12371
Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
0
Attacker Value
Unknown
CVE-2024-11158
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
An “uninitialized variable” code execution vulnerability exists in the
Rockwell Automation Arena®
that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown
CVE-2024-11155
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown
CVE-2024-6068
Disclosure Date: November 14, 2024 (last updated November 15, 2024)
A memory corruption vulnerability exists in the affected products when parsing DFT files. Local threat actors can exploit this issue to disclose information and to execute arbitrary code. To exploit this vulnerability a legitimate user must open a malicious DFT file.
0
Attacker Value
Unknown
CVE-2024-10945
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.
0
Attacker Value
Unknown
CVE-2024-10944
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Remote
Code Execution vulnerability exists in the affected product. The vulnerability requires
a high level of permissions and exists due to improper input validation resulting
in the possibility of a malicious Updated Agent being deployed.
0
Attacker Value
Unknown
CVE-2024-10943
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
An
authentication bypass vulnerability exists in the affected product. The
vulnerability exists due to shared secrets across accounts and could allow a threat
actor to impersonate a user if the threat actor is able to enumerate additional
information required during authentication.
0