First published: Fri Jun 14 2024(Updated: )
A privilege escalation vulnerability exists in the affected product. The vulnerability allows low-privilege users to edit scripts, bypassing Access Control Lists, and potentially gaining further access within the system.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk View SE | ||
FactoryTalk View | >=12.0<14.0 |
AFFECTED PRODUCTS AND SOLUTION Affected Product First Known in software version Corrected in software version FactoryTalk® View SE V12.0 v14 Mitigations and Workarounds Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * Use the Secure Install option when installing FactoryTalk® Services Platform. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-37369 is critical as it allows low-privilege users to bypass Access Control Lists.
To fix CVE-2024-37369, upgrade Rockwell Automation FactoryTalk View SE to a version above 14.0.
CVE-2024-37369 affects users of Rockwell Automation FactoryTalk View SE versions between 12.0 and 14.0.
CVE-2024-37369 is a privilege escalation vulnerability.
Yes, CVE-2024-37369 allows low-privilege users to edit scripts, potentially gaining further unauthorized access.