CVE-2024-7513
Rockwell Automation FactoryTalk® View Site Edition Code Execution Vulnerability via File Permissions
Severity Score
8.5
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
CVE-2024-7513 IMPACT
A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-08-05 CVE Reserved
- 2024-08-14 CVE Published
- 2024-08-14 CVE Updated
- 2024-08-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-732: Incorrect Permission Assignment for Critical Resource
CAPEC
- CAPEC-576: Group Permission Footprinting
References (1)
URL | Tag | Source |
---|---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rockwell Automation Search vendor "Rockwell Automation" | FactoryTalk View Site Edition Search vendor "Rockwell Automation" for product "FactoryTalk View Site Edition" | 13.0 Search vendor "Rockwell Automation" for product "FactoryTalk View Site Edition" and version "13.0" | en |
Affected
|