Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-49g6-wr7w-v4jj

Опубликовано: 16 мая 2024
Источник: github
Github: Не прошло ревью

Описание

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

EPSS

Процентиль: 62%
0.00434
Низкий

Дефекты

CWE-428

Связанные уязвимости

nvd
больше 1 года назад

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

CVSS3: 6.5
fstec
больше 1 года назад

Уязвимость установочного пакета FTRA программного средства обеспечения удаленного доступа к системам автоматизации производства Rockwell Automation FactoryTalk Remote Access, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 62%
0.00434
Низкий

Дефекты

CWE-428