Attacker can manipulate system files or sensitive data through setTimeout() calls

CVE-2024-3980
8.8HIGH

Key Information

Vendor
Hitachi
Status
Microscada Sys600
Vendor
CVE Published:
27 August 2024

Badges

đź“° News Worthy

Summary

The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other files that are critical to the application.

Affected Version(s)

MicroSCADA SYS600 <= 10.5

News Articles

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: 8.8 to: 9.9 - (CRITICAL)

  • First article discovered by null

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 News Article(s)
.