- What is the severity of CVE-2024-7113?
- CVE-2024-7113 has been scored as a high severity vulnerability.
- How to fix CVE-2024-7113?
- To fix CVE-2024-7113: AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users with the affected product versions should apply security updates as soon as possible. All impacted products and affected versions can be fixed by installing SuiteLink v3.7.100 https://softwaresupportsp.aveva.com/#/producthub/details . AVEVA recommends the following general defensive measures: * Apply Host and/or Network firewall rules restricting the SuiteLink server to accept traffic only from trusted source(s). By default, SuiteLink listens on port 5413. For more information, see AVEVA's Security Bulletin AVEVA-2024-007 https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2024-007.pdf .
- Is CVE-2024-7113 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-7113 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-7113?
- CVE-2024-7113 affects AVEVA SuiteLink Server, AVEVA Historian, AVEVA InTouch, AVEVA Application Server, AVEVA Communication Drivers Pack, AVEVA Batch Management.