{"uuid": "7a1222d7-6169-41ac-9e71-1f355480d0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0497", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3511", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0497\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk\u00ae AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.\n\ud83d\udccf Published: 2025-01-30T18:32:09Z\n\ud83d\udccf Modified: 2025-01-30T18:32:09Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0497\n2. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html", "creation_timestamp": "2025-01-30T19:12:41.000000Z"}