CVE-2024-22016

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation.
References
Link Resource
https://rapidscada.org/contact/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*

History

07 Feb 2024, 17:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*
First Time Rapidscada rapid Scada
Rapidscada
CWE CWE-732
References () https://rapidscada.org/contact/ - () https://rapidscada.org/contact/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - Third Party Advisory, US Government Resource

02 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-02 00:15

Updated : 2024-02-28 20:54


NVD link : CVE-2024-22016

Mitre link : CVE-2024-22016

CVE.ORG link : CVE-2024-22016


JSON object : View

Products Affected

rapidscada

  • rapid_scada
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource