Page 3 of 241 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session. La consola JMX dentro de Rockwell Automation Pavilion8 está expuesta a los usuarios de la aplicación y no requiere autenticación. Si se explota, un usuario malintencionado podría potencialmente recuperar los datos de sesión de otros usuarios de la aplicación o cerrar la sesión de los usuarios. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140590 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function. Rockwell Automation FactoryTalk View Machine Edition en PanelView Plus verifica incorrectamente la entrada del usuario, lo que permite a un atacante no autenticado lograr la ejecución remota de código a través de paquetes maliciosos manipulados. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140724 • CWE-20: Improper Input Validation CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.1EPSS: 0%CPEs: 7EXPL: 0

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 • CWE-20: Improper Input Validation CWE-190: Integer Overflow or Wraparound •