Show filters
273 Total Results
Displaying 21-30 of 273
Sort by:
Attacker Value
Unknown
CVE-2024-6325
Disclosure Date: July 16, 2024 (last updated September 11, 2024)
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html
0
Attacker Value
Unknown
CVE-2024-6089
Disclosure Date: July 16, 2024 (last updated September 11, 2024)
An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product.
0
Attacker Value
Unknown
CVE-2024-6435
Disclosure Date: July 16, 2024 (last updated February 01, 2025)
A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
0
Attacker Value
Unknown
CVE-2024-5990
Disclosure Date: June 25, 2024 (last updated September 16, 2024)
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device.
0
Attacker Value
Unknown
CVE-2024-5989
Disclosure Date: June 25, 2024 (last updated September 17, 2024)
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.
0
Attacker Value
Unknown
CVE-2024-5988
Disclosure Date: June 25, 2024 (last updated September 17, 2024)
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.
0
Attacker Value
Unknown
CVE-2024-37369
Disclosure Date: June 14, 2024 (last updated February 01, 2025)
A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system.
0
Attacker Value
Unknown
CVE-2024-37368
Disclosure Date: June 14, 2024 (last updated February 01, 2025)
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.
0
Attacker Value
Unknown
CVE-2024-37367
Disclosure Date: June 14, 2024 (last updated August 17, 2024)
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification.
0
Attacker Value
Unknown
CVE-2024-4609
Disclosure Date: May 16, 2024 (last updated January 31, 2025)
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.
0