Lucene search

K
cveIcscertCVE-2024-22016
HistoryFeb 02, 2024 - 12:15 a.m.

CVE-2024-22016

2024-02-0200:15:55
CWE-732
icscert
web.nvd.nist.gov
29
rapid scada
cve-2024-22016
privilege escalation
security vulnerability
nvd

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.3%

In Rapid Software LLC’s Rapid SCADA versions prior toΒ Version 5.8.4,Β an authorized user can write directly to the Scada directory. This may allow privilege escalation.

Affected configurations

Nvd
Node
rapidscadarapid_scadaRange≀5.8.4
VendorProductVersionCPE
rapidscadarapid_scada*cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Rapid SCADA",
    "vendor": "Rapid Software LLC",
    "versions": [
      {
        "lessThanOrEqual": "5.8.4",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.3%

Related for CVE-2024-22016