Rockwell Automation patches two critical vulnerabilities in Pavilion8
Take action: If you are running Rockwell Automation Pavilion8, make sure it's isolated in a secure network and not accessible from the internet. Then patch ASAP, because two critical flaws will eventually be exploited.
Learn More
Rockwell Automation has issued security updates to patch two critical vulnerabilities affecting its Pavilion8 advanced process control product.
Rockwell Automation's Pavilion8 is a Model Predictive Control (MPC) platform used to optimize industrial processes. Pavilion8 is widely used across various industries, including chemicals, food and beverage, and cement production to manage complex systems and improve decision-making.
Details of the Vulnerabilities:
-
CVE-2024-7960 (CVSS score 9.1) - This vulnerability could allow unauthorized attackers to access sensitive information and modify configuration settings without proper authorization. Exploiting this flaw could potentially compromise the system's integrity.
-
CVE-2024-7961 (CVSS score 9.8) - This path traversal vulnerability allows attackers to perform remote code execution by uploading arbitrary files to the server. It enables attackers to take full control of affected systems.
These vulnerabilities impact Pavilion8 versions prior to 5.20