{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T06:39:07.673","vulnerabilities":[{"cve":{"id":"CVE-2024-1156","sourceIdentifier":"security@ni.com","published":"2024-02-20T15:15:09.910","lastModified":"2025-02-12T18:50:02.210","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges."},{"lang":"es","value":"Los permisos de directorio incorrectos para el servicio NI RabbitMQ compartido pueden permitir que un usuario autenticado local lea la información de configuración de RabbitMQ y potencialmente habilitar la escalada de privilegios."}],"metrics":{"cvssMetricV31":[{"source":"security@ni.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ni.com","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:data_record_ad:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.1","matchCriteriaId":"2267E001-7C8A-4E3C-BAA3-C4108CDC2C11"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:flexlogger:*:*:*:*:*:*:*:*","versionEndIncluding":"2022_q3","matchCriteriaId":"A05CEECE-4F09-4875-97F5-D419044299B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:g_web_development_software:*:*:*:*:*:*:*:*","versionEndIncluding":"2022_q3","matchCriteriaId":"1C4008CF-D7BB-4400-AF25-69A468E0274F"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:community:*:*:*","matchCriteriaId":"E84E23D5-04EB-4B73-B335-AD1F9ECA6166"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:real-time_module:*:*:*","matchCriteriaId":"25474D7C-8523-49BF-8D83-5D82A0D95FD0"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:labview_nxg:5.1:*:*:*:web_module:*:*:*","matchCriteriaId":"06AE0E0E-8E3C-416F-97EC-308FB2953B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:specification_compliance_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"2023_q4","matchCriteriaId":"18B58D78-41AA-484A-A184-DFA999ED504B"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:static_test_software_suite:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","matchCriteriaId":"338BAA7F-884C-41D8-B131-9E2C2FD46DC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:sts_software_bundle:*:*:*:*:*:*:*:*","versionEndIncluding":"21.0","matchCriteriaId":"B018440C-809C-4E30-9A08-AAF79D7D280E"},{"vulnerable":true,"criteria":"cpe:2.3:a:emerson:systemlink_server:*:*:*:*:*:*:*:*","versionEndExcluding":"2024_q1","matchCriteriaId":"95CF6EFB-FED4-428A-8CE5-AAE9D12A64FB"}]}]}],"references":[{"url":"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html","source":"security@ni.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}