First published: Tue Jul 11 2023(Updated: )
The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Powermonitor 1000 Firmware | ||
Rockwellautomation Powermonitor 1000 |
* Customers should upgrade to V4.019 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx which mitigates this issue
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2072 is a vulnerability in the Rockwell Automation PowerMonitor 1000 firmware that allows for stored cross-site scripting attacks.
CVE-2023-2072 has a severity rating of 8.8, which is considered high.
The affected software is the Rockwell Automation PowerMonitor 1000 firmware.
An attacker can exploit CVE-2023-2072 by injecting malicious code into the vulnerable web pages of the PowerMonitor 1000 firmware.
No, authentication is not required to exploit CVE-2023-2072.