cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-6325,https://securityvulnerability.io/vulnerability/CVE-2024-6325,Rockwell Automation Unsecured Private Keys in FactoryTalk® System Services,The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html,Rockwell Automation,"Factorytalk® System Services (installed Via Ftpm),Factorytalk® Policy Manager (ftpm)",6.5,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2024-07-16T17:15:00.000Z,0 CVE-2023-2638,https://securityvulnerability.io/vulnerability/CVE-2023-2638,Rockwell Automation FactoryTalk System Services Vulnerable to a Denial-of-Service Attack," Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.   Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited. ",Rockwell Automation,FactoryTalk System Services,5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-06-13T21:15:00.000Z,0 CVE-2023-2639,https://securityvulnerability.io/vulnerability/CVE-2023-2639,Rockwell Automation FactoryTalk System Services Vulnerable to Sensitive Information Disclosure,"The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.  ",Rockwell Automation,FactoryTalk System Services,4.7,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2023-06-13T21:15:00.000Z,0 CVE-2023-2637,https://securityvulnerability.io/vulnerability/CVE-2023-2637,Rockwell Automation FactoryTalk System Services Vulnerable To Use Of Hard-Coded Cryptographic Key,"Rockwell Automation's FactoryTalk System Services has a security flaw stemming from the use of a hard-coded cryptographic key for generating administrator cookies. This issue potentially allows a local, authenticated non-admin user to create an invalid administrator cookie, granting elevated privileges to the FactoryTalk Policy Manager database. Exploiting this vulnerability could enable a malicious actor to implement unauthorized changes to the database, which could affect the deployment of security policy models by legitimate FactoryTalk Policy Manager users. Successful exploitation requires user interaction, making it a critical focus area for security management.",Rockwell Automation,FactoryTalk System Services,8.2,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-06-13T21:15:00.000Z,0