CVE-2024-7513 IMPACT
A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions.
References
Link | Resource |
---|---|
https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html | Mitigation Vendor Advisory |
Configurations
History
31 Jan 2025, 15:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rockwellautomation factorytalk View
Rockwellautomation |
|
CPE | cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html - Mitigation, Vendor Advisory | |
Summary |
|
14 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-14 20:15
Updated : 2025-01-31 15:25
NVD link : CVE-2024-7513
Mitre link : CVE-2024-7513
CVE.ORG link : CVE-2024-7513
JSON object : View
Products Affected
rockwellautomation
- factorytalk_view
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource