Search criteria
5 vulnerabilities found for PowerMonitor 1000 by Rockwell Automation
VAR-202307-1275
Vulnerability from variot - Updated: 2025-06-07 23:55The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product. It was * Cross-site scripting (CWE-79) - CVE-2023-2072If the vulnerability is exploited, it may be affected as follows. Rockwell Automation PowerMonitor 1000 is a power monitoring device from Rockwell Automation, USA. The vulnerability is caused by the lack of effective filtering and escaping of user-supplied data
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202307-1275",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "powermonitor 1000",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "powermonitor 1000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "powermonitor 1000",
"scope": "eq",
"trust": 0.8,
"vendor": "rockwell automation",
"version": "powermonitor 1000 firmware v4.011"
},
{
"model": "automation powermonitor",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1000"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"cve": "CVE-2023-2072",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2025-11450",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2023-2072",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2023-2072",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2023-2072",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "PSIRT@rockwellautomation.com",
"id": "CVE-2023-2072",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2023-2072",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-11450",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202307-779",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u00a0The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product. It was * Cross-site scripting (CWE-79) - CVE-2023-2072If the vulnerability is exploited, it may be affected as follows. Rockwell Automation PowerMonitor 1000 is a power monitoring device from Rockwell Automation, USA. The vulnerability is caused by the lack of effective filtering and escaping of user-supplied data",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-2072"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "VULMON",
"id": "CVE-2023-2072"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-2072",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-23-194-05",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU97004334",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-11450",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2023-2072",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "VULMON",
"id": "CVE-2023-2072"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"id": "VAR-202307-1275",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
}
]
},
"last_update_date": "2025-06-07T23:55:15.593000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "PowerMonitor\u00a01000\u00a0-\u00a0Cross-Site\u00a0Scripting\u00a0Vulnerability\u00a0 (Login required)",
"trust": 0.8,
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026versions=58300,55146,54770"
},
{
"title": "Patch for Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/693226"
},
{
"title": "Rockwell Automation Allen-Bradley PowerMonitor 1000 Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=246690"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu97004334/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-2072"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-05"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2023-2072/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "VULMON",
"id": "CVE-2023-2072"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"db": "VULMON",
"id": "CVE-2023-2072"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-05-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"date": "2023-07-11T00:00:00",
"db": "VULMON",
"id": "CVE-2023-2072"
},
{
"date": "2023-07-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"date": "2023-07-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"date": "2023-07-11T14:15:09.403000",
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-06-05T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-11450"
},
{
"date": "2023-07-11T00:00:00",
"db": "VULMON",
"id": "CVE-2023-2072"
},
{
"date": "2024-03-13T08:16:00",
"db": "JVNDB",
"id": "JVNDB-2023-002490"
},
{
"date": "2023-07-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202307-779"
},
{
"date": "2023-07-18T21:02:57.793000",
"db": "NVD",
"id": "CVE-2023-2072"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell\u00a0Automation\u00a0 Made \u00a0PowerMonitor\u00a01000\u00a0 Cross-site scripting vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-002490"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202307-779"
}
],
"trust": 0.6
}
}
VAR-201812-0551
Vulnerability from variot - Updated: 2024-11-23 22:12Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted userâs web browser to gain access to the affected device. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. A cross-site scripting vulnerability exists in the /Security/Security.shtm page in RockwellAutomationAllen-BradleyPowerMonitor1000
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0551",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "powermonitor 1000",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "1408-em3a-ent_b"
},
{
"model": "powermonitor 1000",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "automation allen-bradley powermonitor",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1000"
},
{
"model": "automation allen-bradley powermonitor 1408-em3a-ent b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "1000"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "8.0.318"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "7.0.121306"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "6.4.12075"
},
{
"model": "kace k1000 systems management appliance",
"scope": "ne",
"trust": 0.3,
"vendor": "dell",
"version": "9.0.270"
},
{
"model": "1408-em3a-ent b",
"scope": null,
"trust": 0.2,
"vendor": "powermonitor 1000",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:rockwellautomation:powermonitor_1000_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kapil Khot,Luca.Chiou",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-1158"
}
],
"trust": 0.6
},
"cve": "CVE-2018-19615",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2018-19615",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2019-03462",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "7d860591-463f-11e9-a073-000c29342cb1",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-130292",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2018-19615",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2018-19615",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-19615",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2018-19615",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2019-03462",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-1158",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-130292",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "VULHUB",
"id": "VHN-130292"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user\u00e2\u0080\u0099s web browser to gain access to the affected device. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. A cross-site scripting vulnerability exists in the /Security/Security.shtm page in RockwellAutomationAllen-BradleyPowerMonitor1000",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19615"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-130292"
}
],
"trust": 2.97
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-19615",
"trust": 3.9
},
{
"db": "ICS CERT",
"id": "ICSA-19-050-04",
"trust": 3.1
},
{
"db": "PACKETSTORM",
"id": "150600",
"trust": 2.5
},
{
"db": "BID",
"id": "108538",
"trust": 2.0
},
{
"db": "BID",
"id": "106333",
"trust": 2.0
},
{
"db": "EXPLOIT-DB",
"id": "45928",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201812-1158",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2019-03462",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340",
"trust": 0.8
},
{
"db": "IVD",
"id": "7D860591-463F-11E9-A073-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-130292",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "VULHUB",
"id": "VHN-130292"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"id": "VAR-201812-0551",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "VULHUB",
"id": "VHN-130292"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
}
]
},
"last_update_date": "2024-11-23T22:12:12.313000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "PowerMonitor 1000",
"trust": 0.8,
"url": "https://ab.rockwellautomation.com/Energy-Monitoring/1408-PowerMonitor-1000"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-130292"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://packetstormsecurity.com/files/150600/rockwell-automation-allen-bradley-powermonitor-1000-xss.html"
},
{
"trust": 3.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-050-04"
},
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/106333"
},
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/108538"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/45928/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19615"
},
{
"trust": 1.2,
"url": "https://www.rockwellautomation.com/en_in/overview.page"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19615"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "VULHUB",
"id": "VHN-130292"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"db": "VULHUB",
"id": "VHN-130292"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-31T00:00:00",
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"date": "2019-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"date": "2018-12-26T00:00:00",
"db": "VULHUB",
"id": "VHN-130292"
},
{
"date": "2018-11-27T00:00:00",
"db": "BID",
"id": "106333"
},
{
"date": "2019-06-01T00:00:00",
"db": "BID",
"id": "108538"
},
{
"date": "2019-03-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"date": "2018-12-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"date": "2018-12-26T21:29:02.120000",
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-03462"
},
{
"date": "2023-03-01T00:00:00",
"db": "VULHUB",
"id": "VHN-130292"
},
{
"date": "2019-02-22T13:00:00",
"db": "BID",
"id": "106333"
},
{
"date": "2019-06-01T00:00:00",
"db": "BID",
"id": "108538"
},
{
"date": "2019-08-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014340"
},
{
"date": "2020-06-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-1158"
},
{
"date": "2024-11-21T03:58:17.320000",
"db": "NVD",
"id": "CVE-2018-19615"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Allen-Bradley PowerMonitor 1000 Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d860591-463f-11e9-a073-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2019-03462"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
}
],
"trust": 0.6
}
}
VAR-201812-0552
Vulnerability from variot - Updated: 2024-11-23 22:12An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An access control error vulnerability exists in the Web page of Rockwell Automation Allen-Bradley PowerMonitor 1000, which could allow an attacker to add new users with administrator privileges. An attacker may leverage these issues to bypass certain security restrictions, obtain sensitive information and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. An attacker could exploit this vulnerability to add/edit/remove administrator accounts
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201812-0552",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "powermonitor 1000",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "1408-em3a-ent_b"
},
{
"model": "powermonitor 1000",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "automation allen-bradley powermonitor",
"scope": "eq",
"trust": 0.6,
"vendor": "rockwell",
"version": "1000"
},
{
"model": "automation allen-bradley powermonitor 1408-em3a-ent b",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "1000"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "8.0.318"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "7.0.121306"
},
{
"model": "kace k1000 systems management appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "dell",
"version": "6.4.12075"
},
{
"model": "kace k1000 systems management appliance",
"scope": "ne",
"trust": 0.3,
"vendor": "dell",
"version": "9.0.270"
},
{
"model": "1408-em3a-ent b",
"scope": null,
"trust": 0.2,
"vendor": "powermonitor 1000",
"version": null
}
],
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:rockwellautomation:powermonitor_1000_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kapil Khot,Luca.Chiou",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
}
],
"trust": 0.6
},
"cve": "CVE-2018-19616",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2018-19616",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2018-26886",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "7d82f851-463f-11e9-b027-000c29342cb1",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-130293",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2018-19616",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-19616",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-19616",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2018-26886",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201812-203",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-130293",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "VULHUB",
"id": "VHN-130293"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element. Rockwell Automation Allen-Bradley PowerMonitor 1000 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An access control error vulnerability exists in the Web page of Rockwell Automation Allen-Bradley PowerMonitor 1000, which could allow an attacker to add new users with administrator privileges. \nAn attacker may leverage these issues to bypass certain security restrictions, obtain sensitive information and execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. An attacker could exploit this vulnerability to add/edit/remove administrator accounts",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-19616"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "VULHUB",
"id": "VHN-130293"
}
],
"trust": 2.97
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-19616",
"trust": 3.9
},
{
"db": "PACKETSTORM",
"id": "150619",
"trust": 3.1
},
{
"db": "ICS CERT",
"id": "ICSA-19-050-04",
"trust": 3.1
},
{
"db": "BID",
"id": "108538",
"trust": 2.0
},
{
"db": "BID",
"id": "106333",
"trust": 2.0
},
{
"db": "EXPLOIT-DB",
"id": "45937",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2018-26886",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341",
"trust": 0.8
},
{
"db": "IVD",
"id": "7D82F851-463F-11E9-B027-000C29342CB1",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-130293",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "VULHUB",
"id": "VHN-130293"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"id": "VAR-201812-0552",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "VULHUB",
"id": "VHN-130293"
}
],
"trust": 1.9
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
}
]
},
"last_update_date": "2024-11-23T22:12:12.268000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "PowerMonitor 1000",
"trust": 0.8,
"url": "https://ab.rockwellautomation.com/Energy-Monitoring/1408-PowerMonitor-1000"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.1
},
{
"problemtype": "CWE-284",
"trust": 0.9
},
{
"problemtype": "CWE-668",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-130293"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.7,
"url": "http://packetstormsecurity.com/files/150619/rockwell-automation-allen-bradley-powermonitor-1000-authentication-bypass.html"
},
{
"trust": 3.1,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-19-050-04"
},
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/106333"
},
{
"trust": 2.9,
"url": "http://www.securityfocus.com/bid/108538"
},
{
"trust": 1.7,
"url": "https://www.exploit-db.com/exploits/45937/"
},
{
"trust": 1.2,
"url": "https://www.rockwellautomation.com/en_in/overview.page"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19616"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-19616"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "VULHUB",
"id": "VHN-130293"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "VULHUB",
"id": "VHN-130293"
},
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-28T00:00:00",
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"date": "2018-12-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"date": "2018-12-26T00:00:00",
"db": "VULHUB",
"id": "VHN-130293"
},
{
"date": "2018-11-27T00:00:00",
"db": "BID",
"id": "106333"
},
{
"date": "2019-06-01T00:00:00",
"db": "BID",
"id": "108538"
},
{
"date": "2019-03-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"date": "2018-12-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"date": "2018-12-26T21:29:02.230000",
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-12-28T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"date": "2020-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-130293"
},
{
"date": "2019-02-22T13:00:00",
"db": "BID",
"id": "106333"
},
{
"date": "2019-06-01T00:00:00",
"db": "BID",
"id": "108538"
},
{
"date": "2019-03-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-014341"
},
{
"date": "2020-08-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201812-203"
},
{
"date": "2024-11-21T03:58:17.493000",
"db": "NVD",
"id": "CVE-2018-19616"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation Allen-Bradley PowerMonitor 1000 Access Control Error Vulnerability",
"sources": [
{
"db": "IVD",
"id": "7d82f851-463f-11e9-b027-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-26886"
},
{
"db": "CNNVD",
"id": "CNNVD-201812-203"
}
],
"trust": 1.4
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "106333"
},
{
"db": "BID",
"id": "108538"
}
],
"trust": 0.6
}
}
CVE-2023-2072 (GCVE-0-2023-2072)
Vulnerability from nvd – Published: 2023-07-11 13:05 – Updated: 2024-11-07 17:29- CWE-787 - Out-of-bounds Write
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Rockwell Automation | PowerMonitor 1000 |
Affected:
V4.011
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:12:19.922Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "powermonitor_1000",
"vendor": "rockwellautomation",
"versions": [
{
"status": "affected",
"version": "4.011"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2072",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T17:28:29.773714Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T17:29:16.646Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PowerMonitor 1000",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "V4.011"
}
]
}
],
"datePublic": "2023-07-11T13:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u0026nbsp;The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u00a0The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-11T13:05:56.994Z",
"orgId": "b73dd486-f505-4403-b634-40b078b177f0",
"shortName": "Rockwell"
},
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cul\u003e\u003cli\u003eCustomers should upgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=58300,55146,54770\"\u003eV4.019\u003c/a\u003e\u0026nbsp;which mitigates this issue\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e"
}
],
"value": "\n * Customers should upgrade to V4.019 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0which mitigates this issue\n\n\n\n\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0",
"assignerShortName": "Rockwell",
"cveId": "CVE-2023-2072",
"datePublished": "2023-07-11T13:05:56.994Z",
"dateReserved": "2023-04-14T18:04:06.540Z",
"dateUpdated": "2024-11-07T17:29:16.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-2072 (GCVE-0-2023-2072)
Vulnerability from cvelistv5 – Published: 2023-07-11 13:05 – Updated: 2024-11-07 17:29- CWE-787 - Out-of-bounds Write
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Rockwell Automation | PowerMonitor 1000 |
Affected:
V4.011
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T06:12:19.922Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:h:rockwellautomation:powermonitor_1000:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "powermonitor_1000",
"vendor": "rockwellautomation",
"versions": [
{
"status": "affected",
"version": "4.011"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-2072",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T17:28:29.773714Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T17:29:16.646Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PowerMonitor 1000",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "V4.011"
}
]
}
],
"datePublic": "2023-07-11T13:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u0026nbsp;The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. \u00a0The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.\n\n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-11T13:05:56.994Z",
"orgId": "b73dd486-f505-4403-b634-40b078b177f0",
"shortName": "Rockwell"
},
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cul\u003e\u003cli\u003eCustomers should upgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=58300,55146,54770\"\u003eV4.019\u003c/a\u003e\u0026nbsp;which mitigates this issue\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e"
}
],
"value": "\n * Customers should upgrade to V4.019 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0which mitigates this issue\n\n\n\n\n\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Rockwell Automation PowerMonitor 1000 Cross-Site Scripting Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0",
"assignerShortName": "Rockwell",
"cveId": "CVE-2023-2072",
"datePublished": "2023-07-11T13:05:56.994Z",
"dateReserved": "2023-04-14T18:04:06.540Z",
"dateUpdated": "2024-11-07T17:29:16.646Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}