CVE-2024-6435

A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rockwellautomation:pavilion8:5.15.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.15.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.16.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.17.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.17.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.20.00:*:*:*:*:*:*:*

History

31 Jan 2025, 15:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Rockwellautomation pavilion8
Rockwellautomation
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html - Vendor Advisory
CPE cpe:2.3:a:rockwellautomation:pavilion8:5.17.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.17.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.15.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.20.00:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.15.01:*:*:*:*:*:*:*
cpe:2.3:a:rockwellautomation:pavilion8:5.16.00:*:*:*:*:*:*:*

21 Nov 2024, 09:49

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de escalada de privilegios en los productos afectados que podría permitir que un usuario malintencionado con privilegios básicos acceda a funciones que sólo deberían estar disponibles para usuarios con privilegios de nivel administrativo. Si se explota, un atacante podría leer datos confidenciales y crear usuarios. Por ejemplo, un usuario malintencionado con privilegios básicos podría realizar funciones críticas, como crear un usuario con privilegios elevados y leer información confidencial en la sección "vistas".
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html -

16 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-16 13:15

Updated : 2025-01-31 15:01


NVD link : CVE-2024-6435

Mitre link : CVE-2024-6435

CVE.ORG link : CVE-2024-6435


JSON object : View

Products Affected

rockwellautomation

  • pavilion8
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource