Hello!
To view this content, please sign up or log in – it’s free and easy! Stay ahead with curated regulatory insights designed for professionals like you.
Summary
A vulnerability has been identified in Rockwell Automation's Pavilion8 model predictive control software, affecting versions v5.17.00 and v5.17.01. The vulnerability, rated CVSS v3 8.8, is an improper authentication issue in the JMX Console, which allows attackers to retrieve other users' session data. Rockwell Automation recommends updating to v5.20 or disabling the vulnerability in v5.17 by modifying the web.xml file. CISA recommends minimizing network exposure, using firewalls, and implementing secure remote access methods to mitigate the risk of exploitation. No public exploitation has been reported to date.
Hello!
To view this content, please sign up or log in – it’s free and easy! Stay ahead with curated regulatory insights designed for professionals like you.
Highlights content goes here...
Hello!
To view this content, please sign up or log in – it’s free and easy! Stay ahead with curated regulatory insights designed for professionals like you.
An OTP has been sent to your registered email address.