1. EXECUTIVE SUMMARY
- CVSS v4 9.3
- ATTENTION: Exploitable remotely/low attack complexity
- Vendor: Rockwell Automation
- Equipment: DataMosaix Private Cloud
- Vulnerabilities: Exposure of Sensitive Information to an Unauthorized Actor, Dependency on Vulnerable Third-Party Component
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could overwrite reports, including user projects.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Rockwell Automation reports the following versions of DataMosaix Private Cloud are affected:
- DataEdgePlatform DataMosaix Private Cloud: Version 7.11 and prior (CVE-2025-0659)
- DataEdgePlatform DataMosaix Private Cloud: Versions 7.09 and prior (CVE-2020-11656)
3.2 VULNERABILITY OVERVIEW
3.2.1 Exposure of Sensitive Information to an Unauthorized Actor CWE-200
A path traversal vulnerability exists in DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.
CVE-2024-11932 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N).
A CVSS v4 score has also been calculated for CVE-2024-11932. A base score of 7.0 has been calculated; the CVSS vector string is ([…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: