mySCADA myPRO Path Traversal
CVE-2024-50054

7.5HIGH

Key Information:

Vendor
Myscada
Vendor
CVE Published:
22 November 2024

Summary

A vulnerability exists in XYZ Software from ExampleCorp due to inadequate validation of user-controlled filename parameters. This flaw can be exploited by an attacker to launch a path traversal attack, gaining unauthorized access to sensitive files on the system. By manipulating the input, the attacker may retrieve arbitrary files from the file system, potentially compromising confidentiality and integrity. Organizations using affected versions of XYZ Software should implement security best practices and monitor for suspicious activities to mitigate the risk associated with this vulnerability.

Affected Version(s)

myPRO Manager 0 < 1.3

myPRO Runtime 0 < 9.2.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Michael Heinzl reported these vulnerabilities to CISA.
.
CVE-2024-50054 : mySCADA myPRO Path Traversal | SecurityVulnerability.io