CRITICAL · 9.9

CVE-2024-3980

The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the att...

Vulnerability Description

The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other files that are critical to the application.

CVSS Score

9.9

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
HitachienergyMicroscada Pro Sys6009.4
HitachienergyMicroscada X Sys600>= 10.0, < 10.6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-3980?

CVE-2024-3980 is a vulnerability with a CVSS score of 9.9 (CRITICAL). The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the att...

How severe is CVE-2024-3980?

CVE-2024-3980 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2024-3980?

Check the references section above for vendor advisories and patch information. Affected products include: Hitachienergy Microscada Pro Sys600, Hitachienergy Microscada X Sys600.