CVE-2024-22016

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 Third Party Advisory US Government Resource
https://rapidscada.org/contact/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*

History

07 Feb 2024, 17:33

Type Values Removed Values Added
CPE cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*
References () https://rapidscada.org/contact/ - () https://rapidscada.org/contact/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - Third Party Advisory, US Government Resource
First Time Rapidscada rapid Scada
Rapidscada
CWE CWE-732
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

02 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-02 00:15

Updated : 2024-02-07 17:33


NVD link : CVE-2024-22016

Mitre link : CVE-2024-22016


JSON object : View

Products Affected

rapidscada

  • rapid_scada
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource