{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-2072","assignerOrgId":"b73dd486-f505-4403-b634-40b078b177f0","state":"PUBLISHED","assignerShortName":"Rockwell","dateReserved":"2023-04-14T18:04:06.540Z","datePublished":"2023-07-11T13:05:56.994Z","dateUpdated":"2024-11-07T17:29:16.646Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PowerMonitor 1000","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"V4.011"}]}],"datePublic":"2023-07-11T13:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. &nbsp;The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.</span>\n\n<br>"}],"value":"The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product.  The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\n\n\n"}],"impacts":[{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b73dd486-f505-4403-b634-40b078b177f0","shortName":"Rockwell","dateUpdated":"2023-07-11T13:05:56.994Z"},"references":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<ul><li>Customers should upgrade to <a target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113&amp;versions=58300,55146,54770\">V4.019</a>&nbsp;which mitigates this issue</li></ul>\n\n<br>"}],"value":"\n  *  Customers should upgrade to  V4.019 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx  which mitigates this issue\n\n\n\n\n\n"}],"source":{"discovery":"UNKNOWN"},"title":"Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:12:19.922Z"},"title":"CVE Program Container","references":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761","tags":["x_transferred"]}]},{"affected":[{"vendor":"rockwellautomation","product":"powermonitor_1000","cpes":["cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"4.011","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-07T17:28:29.773714Z","id":"CVE-2023-2072","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-07T17:29:16.646Z"}}]}}