Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-3640
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Rockwell Automation FactoryTalk® Remote Access™ has Unquoted Executables
Source: NVD (National Vulnerability Database)
Vulnerability Description
An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
未经引用的搜索路径或元素
Source: NVD (National Vulnerability Database)
Vulnerability Title
Rockwell Automation FactoryTalk Remote Access 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Rockwell Automation FactoryTalk Remote Access是美国罗克韦尔(Rockwell Automation)公司的一种解决方案,它允许用户从任何位置安全地访问、监控和控制他们的工业自动化设备和系统。 Rockwell Automation FactoryTalk Remote Access存在安全漏洞,该漏洞源于存在未加引号的可执行路径,可能会导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Rockwell AutomationFactoryTalk® Remote Access™ v13.5.0.174 -
II. Public POCs for CVE-2024-3640
#POC DescriptionSource LinkShenlong Link
1CVE-2024-3640绕过Waf进行漏洞利用https://github.com/H1ng007/CVE-2024-3640_WafBypassPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-3640
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-3640

No comments yet


Leave a comment