First published: Tue Jul 16 2024(Updated: )
A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
rockwellautomation Pavilion8 | =5.15.00 | |
rockwellautomation Pavilion8 | =5.15.01 | |
rockwellautomation Pavilion8 | =5.16.00 | |
rockwellautomation Pavilion8 | =5.17.00 | |
rockwellautomation Pavilion8 | =5.17.01 | |
rockwellautomation Pavilion8 | =5.20.00 |
Upgrade to v6.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6435 is classified as a privilege escalation vulnerability.
To remediate CVE-2024-6435, ensure that you update to the latest version of Rockwell Automation Pavilion8 as provided in the security advisory.
CVE-2024-6435 affects multiple versions of Rockwell Automation Pavilion8, specifically versions 5.15.00 through 5.20.00.
Yes, if exploited, CVE-2024-6435 could allow attackers to read sensitive data accessible only to administrative users.
CVE-2024-6435 can be exploited by a malicious user with basic privileges to gain access to administrative level functions.