CVE-2024-6435

Rockwell Automation Privilege Escalation Vulnerability in Pavilion8®

Description

A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section.

Remediation

Solution:

  • Upgrade to v6.0

Workaround:

  • Users using the affected software and who are not able to upgrade to one of the corrected versions are encouraged to apply security best practices, where possible.    * Limit access to only users who need it.   * Periodically review user access and privileges to confirm accuracy.   * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.05%
Vendor Advisory rockwellautomation.com
Affected: Rockwell Automation Pavilion8®
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-6435?
CVE-2024-6435 has been scored as a high severity vulnerability.
How to fix CVE-2024-6435?
To fix CVE-2024-6435: Upgrade to v6.0
Is CVE-2024-6435 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-6435 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-6435?
CVE-2024-6435 affects Rockwell Automation Pavilion8®.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.