Логотип exploitDog
bind:CVE-2024-3640
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-3640

Количество 3

Количество 3

nvd логотип

CVE-2024-3640

больше 1 года назад

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

EPSS: Низкий
github логотип

GHSA-49g6-wr7w-v4jj

больше 1 года назад

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

EPSS: Низкий
fstec логотип

BDU:2024-05573

больше 1 года назад

Уязвимость установочного пакета FTRA программного средства обеспечения удаленного доступа к системам автоматизации производства Rockwell Automation FactoryTalk Remote Access, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-3640

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

0%
Низкий
больше 1 года назад
github логотип
GHSA-49g6-wr7w-v4jj

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05573

Уязвимость установочного пакета FTRA программного средства обеспечения удаленного доступа к системам автоматизации производства Rockwell Automation FactoryTalk Remote Access, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.5
0%
Низкий
больше 1 года назад

Уязвимостей на страницу