Attacker can manipulate system files or sensitive data through setTimeout() calls
CVE-2024-3980
8.8HIGH
Key Information
- Vendor
- Hitachi
- Status
- Microscada Sys600
- Vendor
- CVE Published:
- 27 August 2024
Badges
đź“° News Worthy
Summary
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other files that are critical to the application.
Affected Version(s)
MicroSCADA SYS600 <= 10.5
News Articles
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: 8.8 to: 9.9 - (CRITICAL)
First article discovered by null
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database1 News Article(s)