- What is the severity of CVE-2024-37367?
- CVE-2024-37367 has been scored as a high severity vulnerability.
- How to fix CVE-2024-37367?
- To fix CVE-2024-37367: * Corrected in software version v14.0. * Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * It is recommended that users enforce proper access controls within the network and segment networks containing sensitive information using IPSec: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1090456 * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
- Is CVE-2024-37367 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-37367 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-37367?
- CVE-2024-37367 affects Rockwell Automation FactoryTalk® View SE.