First published: Tue Mar 25 2025(Updated: )
An improper control of generation of code ('Code Injection') vulnerability in the AprolCreateReport component of B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to read files from the local system.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
B&R APROL Web Portal | <4.4-00P5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45480 has been classified with a high severity due to its potential for unauthorized file access.
To fix CVE-2024-45480, upgrade B&R APROL to version 4.4-00P5 or later, where this vulnerability is addressed.
CVE-2024-45480 enables network-based attackers to execute code injection attacks and potentially read sensitive files.
Users of B&R APROL versions prior to 4.4-00P5 are affected by CVE-2024-45480.
No, CVE-2024-45480 can be exploited by unauthenticated users, making it particularly concerning.