"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-07-16 14:00:32 +00:00
parent 74916e88ab
commit f86c2804af
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7

View File

@ -1,18 +1,116 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-6435",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "PSIRT@rockwellautomation.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the \u201cviews\u201d section."
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"cweId": "CWE-732"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Rockwell Automation",
"product": {
"product_data": [
{
"product_name": "Pavilion8\u00ae",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "5.15.00"
},
{
"version_affected": "=",
"version_value": "5.15.01"
},
{
"version_affected": "=",
"version_value": "5.16.00"
},
{
"version_affected": "=",
"version_value": "5.17.00"
},
{
"version_affected": "=",
"version_value": "5.17.01"
},
{
"version_affected": "=",
"version_value": "5.20.00"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html",
"refsource": "MISC",
"name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<div><p>Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.\u202f\u202f&nbsp;</p></div><div><ul><li><p>Limit access to only users who need it. &nbsp;</p></li></ul></div><div><ul><li><p>Periodically review user access and privileges to confirm accuracy. &nbsp;</p></li></ul></div><div><ul><li><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">Security Best Practices</a>&nbsp; </p></li></ul></div>\n\n<br>"
}
],
"value": "Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.\u202f\u202f\u00a0\n\n\n\n * Limit access to only users who need it. \u00a0\n\n\n\n\n\n\n * Periodically review user access and privileges to confirm accuracy. \u00a0\n\n\n\n\n\n\n * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Upgrade to v6.0"
}
],
"value": "Upgrade to v6.0"
}
]
}