32 lines
1.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-3640",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-05-16T16:15:10.477",
"lastModified": "2024-05-17T18:36:31.297",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unquoted executable path exists in the Rockwell Automation\u00a0FactoryTalk\u00ae Remote Access\u2122 possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability."
}
],
"metrics": {},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1671.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}