CVE-2024-21852

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution.
References
Link Resource
https://rapidscada.org/contact/ Product
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*

History

07 Feb 2024, 17:15

Type Values Removed Values Added
CPE cpe:2.3:a:rapidscada:rapid_scada:*:*:*:*:*:*:*:*
References () https://rapidscada.org/contact/ - () https://rapidscada.org/contact/ - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - () https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03 - Third Party Advisory, US Government Resource
First Time Rapidscada rapid Scada
Rapidscada
Summary
  • (es) En las versiones de Rapid Software LLC's Rapid SCADA anteriores a la versión 5.8.4, un atacante puede proporcionar un archivo de configuración malicioso utilizando una vulnerabilidad Zip Slip en la rutina de descompresión para lograr la ejecución remota de código.

01 Feb 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-01 23:15

Updated : 2024-02-07 17:15


NVD link : CVE-2024-21852

Mitre link : CVE-2024-21852

CVE.ORG link : CVE-2024-21852


JSON object : View

Products Affected

rapidscada

  • rapid_scada
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')