### [CVE-2024-4609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4609) ![](https://img.shields.io/static/v1?label=Product&message=FactoryTalk%C2%AE%20View%20SE&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen) ### Description A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds