ID

VAR-202409-0743


CVE

CVE-2024-7960


TITLE

Rockwell Automation  of  Pavilion8  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-008408

DESCRIPTION

The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not. Rockwell Automation of Pavilion8 Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. Rockwell Automation Pavilion8 is a model prediction console of Rockwell Automation, an American company

Trust: 2.16

sources: NVD: CVE-2024-7960 // JVNDB: JVNDB-2024-008408 // CNVD: CNVD-2024-40835

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-40835

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:pavilion8scope:ltversion:6.0

Trust: 1.0

vendor:rockwell automationmodel:pavilion8scope:eqversion: -

Trust: 0.8

vendor:rockwell automationmodel:pavilion8scope: - version: -

Trust: 0.8

vendor:rockwell automationmodel:pavilion8scope:eqversion:6.0

Trust: 0.8

vendor:rockwellmodel:automation rockwell automation pavilion8scope:ltversion:v5.20

Trust: 0.6

sources: CNVD: CNVD-2024-40835 // JVNDB: JVNDB-2024-008408 // NVD: CVE-2024-7960

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-7960
value: CRITICAL

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2024-7960
value: HIGH

Trust: 1.0

NVD: CVE-2024-7960
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-40835
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-40835
severity: HIGH
baseScore: 8.0
vectorString: AV:N/AC:L/AU:S/C:C/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-7960
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2024-7960
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-40835 // JVNDB: JVNDB-2024-008408 // NVD: CVE-2024-7960 // NVD: CVE-2024-7960

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-269

Trust: 1.0

problemtype:Improper authority management (CWE-269) [ others ]

Trust: 0.8

problemtype: Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-008408 // NVD: CVE-2024-7960

PATCH

title:Patch for Rockwell Automation Pavilion8 Authorization Issue Vulnerability (CNVD-2024-40835)url:https://www.cnvd.org.cn/patchInfo/show/599676

Trust: 0.6

sources: CNVD: CNVD-2024-40835

EXTERNAL IDS

db:NVDid:CVE-2024-7960

Trust: 3.2

db:JVNid:JVNVU94816770

Trust: 0.8

db:ICS CERTid:ICSA-24-256-24

Trust: 0.8

db:JVNDBid:JVNDB-2024-008408

Trust: 0.8

db:CNVDid:CNVD-2024-40835

Trust: 0.6

sources: CNVD: CNVD-2024-40835 // JVNDB: JVNDB-2024-008408 // NVD: CVE-2024-7960

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1695.html

Trust: 2.4

url:https://jvn.jp/vu/jvnvu94816770/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-7960

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-24

Trust: 0.8

sources: CNVD: CNVD-2024-40835 // JVNDB: JVNDB-2024-008408 // NVD: CVE-2024-7960

SOURCES

db:CNVDid:CNVD-2024-40835
db:JVNDBid:JVNDB-2024-008408
db:NVDid:CVE-2024-7960

LAST UPDATE DATE

2024-10-18T03:46:38.759000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-40835date:2024-10-16T00:00:00
db:JVNDBid:JVNDB-2024-008408date:2024-09-19T06:57:00
db:NVDid:CVE-2024-7960date:2024-09-19T01:52:55.193

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-40835date:2024-10-16T00:00:00
db:JVNDBid:JVNDB-2024-008408date:2024-09-19T00:00:00
db:NVDid:CVE-2024-7960date:2024-09-12T21:15:03.153