CVE-2024-7513 IMPACT A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions.
History

Fri, 31 Jan 2025 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 14 Aug 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation factorytalk View
CPEs cpe:2.3:a:rockwellautomation:factorytalk_view:13.0:*:*:*:se:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation factorytalk View
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Description CVE-2024-7513 IMPACT A code execution vulnerability exists in the affected product. The vulnerability occurs due to improper default file permissions allowing any user to edit or replace files, which are executed by account with elevated permissions.
Title Rockwell Automation FactoryTalk® View Site Edition Code Execution Vulnerability via File Permissions
Weaknesses CWE-732
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-08-14T20:16:25.948Z

Reserved: 2024-08-05T20:18:13.759Z

Link: CVE-2024-7513

cve-icon Vulnrichment

Updated: 2024-08-14T20:16:19.702Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-14T20:15:13.013

Modified: 2025-01-31T15:25:24.030

Link: CVE-2024-7513

cve-icon Redhat

No data.