First published: Thu Sep 12 2024(Updated: )
CVE-2024-45824 IMPACT A remote code vulnerability exists in the affected products. The vulnerability occurs when chained with Path Traversal, Command Injection, and XSS Vulnerabilities and allows for full unauthenticated remote code execution. The link in the mitigations section below contains patches to fix this issue.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
FactoryTalk View | >=12.0<=14.0 | |
FactoryTalk View |
Navigate to the following link and apply patches https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1151301 , directions are on the link page ( https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1151301 )
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45824 is classified as a critical severity vulnerability allowing unauthenticated remote code execution.
To mitigate CVE-2024-45824, it is recommended to apply the latest security patches provided by Rockwell Automation.
CVE-2024-45824 affects Rockwell Automation's FactoryTalk View Site Edition versions 12.0 to 14.0.
Yes, CVE-2024-45824 allows for full unauthenticated remote code execution when exploited.
CVE-2024-45824 can be chained with Path Traversal, Command Injection, and XSS vulnerabilities.