Vulnerability Description
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability an attacker must have a valid credential.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hitachienergy | Microscada Pro Sys600 | 9.4 |
| Hitachienergy | Microscada X Sys600 | >= 10.0, < 10.6 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-4872?
CVE-2024-4872 is a vulnerability with a CVSS score of 9.9 (CRITICAL). A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to succ...
How severe is CVE-2024-4872?
CVE-2024-4872 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-4872?
Check the references section above for vendor advisories and patch information. Affected products include: Hitachienergy Microscada Pro Sys600, Hitachienergy Microscada X Sys600.