Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-12371", "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "state": "PUBLISHED", "assignerShortName": "Rockwell", "dateReserved": "2024-12-09T17:50:47.624Z", "datePublished": "2024-12-18T15:23:37.736Z", "dateUpdated": "2024-12-18T19:59:35.810Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "PM1k 1408-BC3A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-BC3A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TS3A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TS3A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM3A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM3A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TR1A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TR2A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<v4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM1A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM2A-485", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TR1A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-TR2A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM1A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}, {"defaultStatus": "unaffected", "product": "PM1k 1408-EM2A-ENT", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "<4.020"}]}], "datePublic": "2024-12-17T14:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.</span>"}], "value": "A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset."}], "metrics": [{"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "providerMetadata": {"orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell", "dateUpdated": "2024-12-18T15:23:37.736Z"}, "references": [{"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<table><tbody><tr><td><p>Affected Products</p></td><td><p>Affected firmware revision</p></td><td><p>Corrected in firmware revision</p></td></tr><tr><td><p>PM1k 1408-BC3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-BC3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TS3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TS3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM3A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM3A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR1A-485<b></b></p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR2A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM1A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM2A-485</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR1A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-TR2A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM1A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr><tr><td><p>PM1k 1408-EM2A-ENT</p></td><td><p><4.020</p></td><td><p>4.020</p></td></tr></tbody></table>\n\n<br>\n\n<p><b>Mitigations and Workarounds</b></p><p>Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. </p><p>\u00b7 <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">Security Best Practices</a></p>\n\n<br>"}], "value": "Affected Products\n\nAffected firmware revision\n\nCorrected in firmware revision\n\nPM1k 1408-BC3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-BC3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TS3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TS3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM3A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM3A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TR1A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TR2A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM1A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-EM2A-485\n\n<4.020\n\n4.020\n\nPM1k 1408-TR1A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-TR2A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM1A-ENT\n\n<4.020\n\n4.020\n\nPM1k 1408-EM2A-ENT\n\n<4.020\n\n4.020\n\n\n\n\n\n\nMitigations and Workarounds\n\nUsers using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. \u00a0 \n\n\u00b7 \u00a0 \u00a0 \u00a0 Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"}], "source": {"advisory": "SD1714", "discovery": "EXTERNAL"}, "title": "Rockwell Automation PowerMonitor\u2122 1000 Remote Code Execution", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-306", "lang": "en", "description": "CWE-306 Missing Authentication for Critical Function"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-12-18T19:58:35.484632Z", "id": "CVE-2024-12371", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-12-18T19:59:35.810Z"}}]}}