CVE-2024-7513 IMPACT
A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html | Mitigation Vendor Advisory |
Configurations
History
31 Jan 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Rockwellautomation
Rockwellautomation factorytalk View |
Information
Published : 2024-08-14 20:15
Updated : 2025-01-31 15:25
NVD link : CVE-2024-7513
Mitre link : CVE-2024-7513
CVE.ORG link : CVE-2024-7513
JSON object : View
Products Affected
rockwellautomation
- factorytalk_view
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource