CVE-2024-21914
- EPSS 0.05%
- Veröffentlicht 25.03.2024 22:37:19
- Zuletzt bearbeitet 19.09.2025 15:26:55
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or ...
CVE-2023-46289
- EPSS 0.17%
- Veröffentlicht 27.10.2023 19:15:41
- Zuletzt bearbeitet 21.11.2024 08:28:14
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a ...
CVE-2023-2071
- EPSS 0.67%
- Veröffentlicht 12.09.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:57:52
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, thr...
CVE-2020-14481
- EPSS 0.02%
- Veröffentlicht 24.02.2022 19:15:08
- Zuletzt bearbeitet 17.04.2025 19:15:50
The DeskLock tool provided with FactoryTalk View SE uses a weak encryption algorithm that may allow a local, authenticated attacker to decipher user credentials, including the Windows user or Windows DeskLock passwords. If the compromised user has an...
CVE-2020-14480
- EPSS 0.03%
- Veröffentlicht 24.02.2022 19:15:08
- Zuletzt bearbeitet 17.04.2025 19:15:50
Due to usernames/passwords being stored in plaintext in Random Access Memory (RAM), a local, authenticated attacker could gain access to certain credentials, including Windows Logon credentials.
CVE-2020-12031
- EPSS 0.01%
- Veröffentlicht 20.07.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:08
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation rec...
CVE-2020-12028
- EPSS 28.3%
- Veröffentlicht 20.07.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:08
In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recomm...
CVE-2020-12027
- EPSS 23.53%
- Veröffentlicht 20.07.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:08
All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabli...
CVE-2020-12029
- EPSS 24.62%
- Veröffentlicht 20.07.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:59:08
All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). ...