A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.
Metrics
Affected Vendors & Products
References
History
Fri, 31 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation pavilion8 |
|
CPEs | cpe:2.3:a:rockwellautomation:pavilion8:5.15.00:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:pavilion8:5.15.01:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:pavilion8:5.16.00:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:pavilion8:5.17.00:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:pavilion8:5.17.01:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:pavilion8:5.20.00:*:*:*:*:*:*:* |
|
Vendors & Products |
Rockwellautomation
Rockwellautomation pavilion8 |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2024-08-01T21:41:03.349Z
Reserved: 2024-07-01T21:06:41.384Z
Link: CVE-2024-6435

Updated: 2024-08-01T21:41:03.349Z

Status : Analyzed
Published: 2024-07-16T13:15:13.630
Modified: 2025-01-31T15:01:23.807
Link: CVE-2024-6435

No data.