First published: Thu May 11 2023(Updated: )
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ArmorStart ST 284EE Firmware | ||
Rockwell Automation ArmorStart ST 284EE Firmware | ||
Rockwell Automation ArmorStart ST 281E Firmware | ||
Rockwell Automation ArmorStart ST 281E Firmware | ||
All of | ||
Rockwell Automation ArmorStart ST 284EE Firmware | ||
Rockwell Automation ArmorStart ST 284EE Firmware | ||
All of | ||
Rockwell Automation ArmorStart ST 281E Firmware | ||
Rockwell Automation ArmorStart ST 281E Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29031 is a cross-site scripting vulnerability discovered in Rockwell Automation's ArmorStart ST product.
The severity of CVE-2023-29031 is high with a CVSS score of 7.1.
CVE-2023-29031 could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable.
Yes, user interaction, such as a phishing attack, is required for successful exploitation of CVE-2023-29031.
To fix CVE-2023-29031, it is recommended to apply the latest firmware or software updates provided by Rockwell Automation.