First published: Thu Aug 29 2024(Updated: )
An untrusted search path vulnerability in the AprolConfigureCCServices of B&R APROL <= R 4.2.-07P3 and <= R 4.4-00P3 may allow an authenticated local attacker to execute arbitrary code with elevated privileges.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
B&R Industrial Automation Aprol | <=r4.2-07p3 | |
B&R Industrial Automation Aprol | >=r4.3-00p3<=r4.4-00p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5622 has a high severity rating due to its potential for allowing authenticated local attackers to execute arbitrary code with elevated privileges.
To mitigate CVE-2024-5622, upgrade to a patched version of B&R APROL beyond R 4.2-07P3 and R 4.4-00P3.
CVE-2024-5622 affects users of B&R APROL versions R 4.2-07P3 and R 4.4-00P3.
An untrusted search path vulnerability allows an attacker to execute malicious code by using a manipulated search path during application execution.
Yes, CVE-2024-5622 requires that the attacker is authenticated as a local user to execute the attack.