We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12371

Rockwell Automation PowerMonitor™ 1000 Remote Code Execution



Description

A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.

Reserved 2024-12-09 | Published 2024-12-18 | Updated 2024-12-18 | Assigner Rockwell


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Product status

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

Default status
unaffected

<4.020
affected

References

www.rockwellautomation.com/...dvisories/advisory.SD1714.html

cve.org (CVE-2024-12371)

nvd.nist.gov (CVE-2024-12371)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-12371

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.