CVE-2024-7113

Allocation of Resources Without Limits or Throttling in AVEVA SuiteLink Server

Description

If exploited, this vulnerability could cause a SuiteLink server to consume excessive system resources and slow down processing of Data I/O for the duration of the attack.

Remediation

Solution:

  • AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users with the affected product versions should apply security updates as soon as possible. All impacted products and affected versions can be fixed by installing SuiteLink v3.7.100 https://softwaresupportsp.aveva.com/#/producthub/details . AVEVA recommends the following general defensive measures: * Apply Host and/or Network firewall rules restricting the SuiteLink server to accept traffic only from trusted source(s). By default, SuiteLink listens on port 5413. For more information, see AVEVA's Security Bulletin AVEVA-2024-007 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-007.pdf .

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
EPSS 0.05%
Affected: AVEVA SuiteLink Server
Affected: AVEVA Historian
Affected: AVEVA InTouch
Affected: AVEVA Application Server
Affected: AVEVA Communication Drivers Pack
Affected: AVEVA Batch Management
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-7113?
CVE-2024-7113 has been scored as a high severity vulnerability.
How to fix CVE-2024-7113?
To fix CVE-2024-7113: AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users with the affected product versions should apply security updates as soon as possible. All impacted products and affected versions can be fixed by installing SuiteLink v3.7.100 https://softwaresupportsp.aveva.com/#/producthub/details . AVEVA recommends the following general defensive measures: * Apply Host and/or Network firewall rules restricting the SuiteLink server to accept traffic only from trusted source(s). By default, SuiteLink listens on port 5413. For more information, see AVEVA's Security Bulletin AVEVA-2024-007 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-007.pdf .
Is CVE-2024-7113 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-7113 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-7113?
CVE-2024-7113 affects AVEVA SuiteLink Server, AVEVA Historian, AVEVA InTouch, AVEVA Application Server, AVEVA Communication Drivers Pack, AVEVA Batch Management.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.