ID

VAR-202409-2108


CVE

CVE-2024-45824


TITLE

Rockwell Automation FactoryTalk View Site Edition Remote Code Execution Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2024-46730

DESCRIPTION

CVE-2024-45824 IMPACT A remote code vulnerability exists in the affected products. The vulnerability occurs when chained with Path Traversal, Command Injection, and XSS Vulnerabilities and allows for full unauthenticated remote code execution. The link in the mitigations section below contains patches to fix this issue. Rockwell Automation FactoryTalk View Site Edition is an integrated software package of Rockwell Automation, Inc., USA. It is used for development and operation

Trust: 1.44

sources: NVD: CVE-2024-45824 // CNVD: CNVD-2024-46730

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-46730

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:factorytalk viewscope:gteversion:12.0

Trust: 1.0

vendor:rockwellautomationmodel:factorytalk viewscope:lteversion:14.0

Trust: 1.0

vendor:rockwellmodel:automation rockwell automation factorytalk view site editionscope:eqversion:v12.0

Trust: 0.6

vendor:rockwellmodel:automation rockwell automation factorytalk view site editionscope:eqversion:v13.0

Trust: 0.6

vendor:rockwellmodel:automation rockwell automation factorytalk view site editionscope:eqversion:v14.0

Trust: 0.6

sources: CNVD: CNVD-2024-46730 // NVD: CVE-2024-45824

CVSS

SEVERITY

CVSSV2

CVSSV3

PSIRT@rockwellautomation.com: CVE-2024-45824
value: CRITICAL

Trust: 1.0

nvd@nist.gov: CVE-2024-45824
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2024-46730
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-46730
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

PSIRT@rockwellautomation.com: CVE-2024-45824
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: CNVD: CNVD-2024-46730 // NVD: CVE-2024-45824 // NVD: CVE-2024-45824

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2024-45824

PATCH

title:Patch for Rockwell Automation FactoryTalk View Site Edition Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/634576

Trust: 0.6

sources: CNVD: CNVD-2024-46730

EXTERNAL IDS

db:NVDid:CVE-2024-45824

Trust: 1.6

db:CNVDid:CNVD-2024-46730

Trust: 0.6

sources: CNVD: CNVD-2024-46730 // NVD: CVE-2024-45824

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1696.html

Trust: 1.6

sources: CNVD: CNVD-2024-46730 // NVD: CVE-2024-45824

SOURCES

db:CNVDid:CNVD-2024-46730
db:NVDid:CVE-2024-45824

LAST UPDATE DATE

2025-01-31T23:11:22.591000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-46730date:2024-12-02T00:00:00
db:NVDid:CVE-2024-45824date:2025-01-31T15:25:14.390

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-46730date:2024-12-02T00:00:00
db:NVDid:CVE-2024-45824date:2024-09-12T14:16:06.953