A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html | Vendor Advisory |
https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html | Vendor Advisory |
Configurations
History
30 Jan 2025, 15:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html - Vendor Advisory | |
CWE | CWE-89 | |
CPE | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
First Time |
Rockwellautomation
Rockwellautomation factorytalk View |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Information
Published : 2024-05-16 16:15
Updated : 2025-01-30 15:50
NVD link : CVE-2024-4609
Mitre link : CVE-2024-4609
CVE.ORG link : CVE-2024-4609
JSON object : View
Products Affected
rockwellautomation
- factorytalk_view