First published: Thu Sep 12 2024(Updated: )
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pavilion8 | <6.0 |
Affected Product Affected Software Version Corrected in Software Version Pavilion8® <V5.20 V6.0 and later Mitigations and Workarounds Customers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7961 is high due to its potential for remote code execution.
CVE-2024-7961 affects Rockwell Automation Pavilion8 versions prior to 6.0.
To fix CVE-2024-7961, users should apply the latest security updates released by Rockwell Automation.
CVE-2024-7961 is classified as a path traversal vulnerability.
If exploited, CVE-2024-7961 could allow a threat actor to upload arbitrary files, leading to potential remote code execution.