First published: Mon Oct 14 2024(Updated: )
VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
RSLogix | ||
Rockwell Automation RSLogix 500 Standard Edition |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7847 has a severity rating that indicates a significant potential for impact on the affected systems.
To fix CVE-2024-7847, users should update to the latest versions of Rockwell Automation RSLogix 5 and RSLogix 500 as recommended by the vendor.
CVE-2024-7847 affects Rockwell Automation RSLogix 5 and RSLogix 500 software products.
CVE-2024-7847 was reported by Sharon Brizinov of Claroty Research - Team82.
Yes, official documentation and details for CVE-2024-7847 can be found in the security advisory from Rockwell Automation.