2024-12-11 21:03:52 +00:00

120 lines
3.8 KiB
JSON

{
"id": "CVE-2024-21915",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-02-16T19:15:08.460",
"lastModified": "2024-12-11T19:31:28.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nA privilege escalation vulnerability exists in Rockwell Automation FactoryTalk\u00ae Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.\n\n"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de escalada de privilegios en Rockwell Automation FactoryTalk\u00ae Service Platform (FTSP). Si se explota, un usuario malintencionado con privilegios b\u00e1sicos de grupo de usuarios podr\u00eda iniciar sesi\u00f3n en el software y recibir privilegios de grupo de administrador FTSP. Un actor de amenazas podr\u00eda potencialmente leer y modificar datos confidenciales, eliminar datos y hacer que el sistema FTSP no est\u00e9 disponible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.74",
"matchCriteriaId": "1B7CF7EA-7F18-4103-8E35-80800D1FA9E5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
]
}
]
}