{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T23:16:45.767","vulnerabilities":[{"cve":{"id":"CVE-2024-6435","sourceIdentifier":"PSIRT@rockwellautomation.com","published":"2024-07-16T13:15:13.630","lastModified":"2025-01-31T15:01:23.807","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A privilege escalation vulnerability exists in the affected products which could allow a malicious user with basic privileges to access functions which should only be available to users with administrative level privileges. If exploited, an attacker could read sensitive data, and create users. For example, a malicious user with basic privileges could perform critical functions such as creating a user with elevated privileges and reading sensitive information in the “views” section."},{"lang":"es","value":"Existe una vulnerabilidad de escalada de privilegios en los productos afectados que podría permitir que un usuario malintencionado con privilegios básicos acceda a funciones que sólo deberían estar disponibles para usuarios con privilegios de nivel administrativo. Si se explota, un atacante podría leer datos confidenciales y crear usuarios. Por ejemplo, un usuario malintencionado con privilegios básicos podría realizar funciones críticas, como crear un usuario con privilegios elevados y leer información confidencial en la sección \"vistas\"."}],"metrics":{"cvssMetricV40":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"PSIRT@rockwellautomation.com","type":"Secondary","description":[{"lang":"en","value":"CWE-732"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.15.00:*:*:*:*:*:*:*","matchCriteriaId":"49331A31-6BB8-418C-9500-AA58346FB5FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.15.01:*:*:*:*:*:*:*","matchCriteriaId":"EEDB0C95-55EE-42E6-807C-2FB531485014"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.16.00:*:*:*:*:*:*:*","matchCriteriaId":"B644F6C8-003F-4A6B-B2EA-B8B7E49FAE00"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.17.00:*:*:*:*:*:*:*","matchCriteriaId":"2F09395B-E691-43A1-A7DC-E6240BD9776C"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.17.01:*:*:*:*:*:*:*","matchCriteriaId":"53E846B6-1E6F-4E62-8683-FD805040B73E"},{"vulnerable":true,"criteria":"cpe:2.3:a:rockwellautomation:pavilion8:5.20.00:*:*:*:*:*:*:*","matchCriteriaId":"F95BB706-D8F0-45DE-85CC-791D3C4D1AAB"}]}]}],"references":[{"url":"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html","source":"PSIRT@rockwellautomation.com","tags":["Vendor Advisory"]},{"url":"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1681.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}