We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3640

Rockwell Automation FactoryTalk® Remote Access™ has Unquoted Executables



Description

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

Reserved 2024-04-10 | Published 2024-05-16 | Updated 2024-08-01 | Assigner Rockwell


HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-428 Unquoted Search Path or Element

Product status

Default status
unaffected

v13.5.0.174
affected

References

www.rockwellautomation.com/...s/support/advisory.SD1671.html

cve.org (CVE-2024-3640)

nvd.nist.gov (CVE-2024-3640)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-3640

Support options

Helpdesk Chat, Email, Knowledgebase