First published: Fri Nov 22 2024(Updated: )
The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
mySCADA |
mySCADA recommends updating to the latest versions: * mySCADA PRO Manager 1.3 https://www.myscada.org/resources/ * mySCADA PRO Runtime 9.2.1 https://www.myscada.org/resources/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50054 is classified as a high severity vulnerability due to potential unauthorized access to sensitive files.
To fix CVE-2024-50054, ensure that the application properly validates and sanitizes user-controlled filename parameters to prevent path traversal.
CVE-2024-50054 can facilitate path traversal attacks, allowing attackers to access arbitrary files on the system.
CVE-2024-50054 affects the mySCADA myPRO Manager software.
If using a vulnerable version of mySCADA myPRO, it is recommended to apply security patches as they are made available by the vendor.