{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7847","assignerOrgId":"b73dd486-f505-4403-b634-40b078b177f0","state":"PUBLISHED","assignerShortName":"Rockwell","dateReserved":"2024-08-15T15:51:22.233Z","datePublished":"2024-10-14T13:47:14.540Z","dateUpdated":"2024-10-15T14:05:45.670Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"RSLogix 500®","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"All"}]},{"defaultStatus":"unaffected","product":"RSLogix™ Micro Developer and Starter","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"All"}]},{"defaultStatus":"unaffected","product":"RSLogix™ 5","vendor":"Rockwell Automation","versions":[{"status":"affected","version":"All"}]}],"credits":[{"lang":"en","type":"reporter","value":"Sharon Brizinov of Claroty Research - Team82"}],"datePublic":"2024-09-19T13:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><b>VULNERABILITY DETAILS</b></p><p>Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. </p><p>A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention.  This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.</p>"}],"value":"VULNERABILITY DETAILS\n\nRockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. \n\nA feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention.  This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability."}],"impacts":[{"capecId":"CAPEC-19","descriptions":[{"lang":"en","value":"CAPEC-19 Embedding Scripts within Scripts"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":8.8,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-345","description":"CWE-345 Insufficient Verification of Data Authenticity","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"b73dd486-f505-4403-b634-40b078b177f0","shortName":"Rockwell","dateUpdated":"2024-10-14T13:47:14.540Z"},"references":[{"url":"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1701.html"}],"source":{"discovery":"EXTERNAL"},"title":"RSLogix™ 5 and RSLogix 500® Remote Code Execution Via VBA Embedded Script","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p><b>Mitigations and Workarounds </b></p><p>Users using the affected software are encouraged to apply the following mitigations and security best practices, where possible. </p><p>· &nbsp; &nbsp; &nbsp; Deny the execution feature in FactoryTalk® Administration Console, when not needed, by navigating to “Policies”, selecting ‘”Enable/Disable VBA”, and then checking the “Deny” box to block VBA code execution.</p><p>· &nbsp; &nbsp; &nbsp; Save project files in a Trusted® location where only administrators can modify it and verify file integrity.</p><p>· &nbsp; &nbsp; &nbsp; Utilize the VBA editor protection feature, which locks the VBA code from viewing and editing by setting a password.</p>"}],"value":"Mitigations and Workarounds \n\nUsers using the affected software are encouraged to apply the following mitigations and security best practices, where possible. \n\n·       Deny the execution feature in FactoryTalk® Administration Console, when not needed, by navigating to “Policies”, selecting ‘”Enable/Disable VBA”, and then checking the “Deny” box to block VBA code execution.\n\n·       Save project files in a Trusted® location where only administrators can modify it and verify file integrity.\n\n·       Utilize the VBA editor protection feature, which locks the VBA code from viewing and editing by setting a password."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"rockwellautomation","product":"rslogix_500","cpes":["cpe:2.3:a:rockwellautomation:rslogix_500:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"rslogix_micro_developer","cpes":["cpe:2.3:a:rockwellautomation:rslogix_micro_developer:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"rslogix_micro_starter","cpes":["cpe:2.3:a:rockwellautomation:rslogix_micro_starter:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"rockwellautomation","product":"rslogix_5","cpes":["cpe:2.3:a:rockwellautomation:rslogix_5:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-14T15:18:18.670939Z","id":"CVE-2024-7847","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-15T14:05:45.670Z"}}]}}