Overview
- Description
- The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.
- Source
- PSIRT@rockwellautomation.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "882E9A4B-4CBB-40B5-B411-CDF3C33B1156" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:rockwellautomation:powermonitor_1000_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C04FB15-DF14-4CD3-B2F3-27463AF3C900" } ], "operator": "OR" } ], "operator": "AND" } ]