Логотип exploitDog
bind:CVE-2024-7847
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-7847

Количество 3

Количество 3

nvd логотип

CVE-2024-7847

больше 1 года назад

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

CVSS3: 7.7
EPSS: Низкий
github логотип

GHSA-wr43-q2v2-949w

больше 1 года назад

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

CVSS3: 7.7
EPSS: Низкий
fstec логотип

BDU:2024-07285

больше 1 года назад

Уязвимость обработчика VBA-скриптов программного обеспечения RSLogix 5 и RSLogix 500, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-7847

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

CVSS3: 7.7
0%
Низкий
больше 1 года назад
github логотип
GHSA-wr43-q2v2-949w

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

CVSS3: 7.7
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-07285

Уязвимость обработчика VBA-скриптов программного обеспечения RSLogix 5 и RSLogix 500, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.7
0%
Низкий
больше 1 года назад

Уязвимостей на страницу