Show filters
40 Total Results
Displaying 11-20 of 40
Sort by:
Attacker Value
Unknown

CVE-2024-12672

Disclosure Date: December 19, 2024 (last updated December 20, 2024)
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown

CVE-2024-12373

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.
0
Attacker Value
Unknown

CVE-2024-12372

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.
0
Attacker Value
Unknown

CVE-2024-12371

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.
0
Attacker Value
Unknown

CVE-2024-11158

Disclosure Date: December 05, 2024 (last updated December 21, 2024)
An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown

CVE-2024-11155

Disclosure Date: December 05, 2024 (last updated December 21, 2024)
A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.
0
Attacker Value
Unknown

CVE-2024-6068

Disclosure Date: November 14, 2024 (last updated November 15, 2024)
A memory corruption vulnerability exists in the affected products when parsing DFT files. Local threat actors can exploit this issue to disclose information and to execute arbitrary code. To exploit this vulnerability a legitimate user must open a malicious DFT file.
0
Attacker Value
Unknown

CVE-2024-10945

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation.
0
Attacker Value
Unknown

CVE-2024-10944

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
A Remote Code Execution vulnerability exists in the affected product. The vulnerability requires a high level of permissions and exists due to improper input validation resulting in the possibility of a malicious Updated Agent being deployed.
0
Attacker Value
Unknown

CVE-2024-10943

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
An authentication bypass vulnerability exists in the affected product. The vulnerability exists due to shared secrets across accounts and could allow a threat actor to impersonate a user if the threat actor is able to enumerate additional information required during authentication.
0