Логотип exploitDog
bind:CVE-2024-6242
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-6242

Количество 3

Количество 3

nvd логотип

CVE-2024-6242

больше 1 года назад

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

EPSS: Низкий
github логотип

GHSA-6h2q-3m5q-wv4c

больше 1 года назад

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

EPSS: Низкий
fstec логотип

BDU:2024-05963

больше 1 года назад

Уязвимость функции Trusted Slot микропрограммного обеспечения программируемых логических контроллеров Rockwell Automation 1756-EN4TR, 1756-EN2T Series A/B/C, 1756-EN2F Series A/B, 1756-EN2TR Series A/B, 1756-EN3TR Series B, 1756-EN2T Series D, 1756-EN2F Series C, 1756-EN2TR Series C, 1756-EN3TR Series B, 1756-EN2TP Series A, позволяющая нарушителю изменить пользовательские проекты и/или конфигурацию устройства

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-6242

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

0%
Низкий
больше 1 года назад
github логотип
GHSA-6h2q-3m5q-wv4c

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-05963

Уязвимость функции Trusted Slot микропрограммного обеспечения программируемых логических контроллеров Rockwell Automation 1756-EN4TR, 1756-EN2T Series A/B/C, 1756-EN2F Series A/B, 1756-EN2TR Series A/B, 1756-EN3TR Series B, 1756-EN2T Series D, 1756-EN2F Series C, 1756-EN2TR Series C, 1756-EN3TR Series B, 1756-EN2TP Series A, позволяющая нарушителю изменить пользовательские проекты и/или конфигурацию устройства

CVSS3: 8.4
0%
Низкий
больше 1 года назад

Уязвимостей на страницу