Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Open Automation Software recommends users upgrade OAS to V20.00.0076 or later. The upgrade can be downloaded from the Open Automation Software website https://openautomationsoftware.com/downloads/ .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34051 | A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation. |
Thu, 23 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openautomationsoftware open Automation Software
|
|
| Weaknesses | CWE-732 | |
| CPEs | cpe:2.3:a:openautomationsoftware:open_automation_software:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openautomationsoftware open Automation Software
|
Fri, 06 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openautomationsoftware
Openautomationsoftware oas Platform |
|
| CPEs | cpe:2.3:a:openautomationsoftware:oas_platform:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openautomationsoftware
Openautomationsoftware oas Platform |
|
| Metrics |
ssvc
|
Fri, 06 Dec 2024 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local low-level user on the server machine with credentials to the running OAS services can create and execute a report with an rdlx file on the server system itself. Any code within the rdlx file of the report executes with SYSTEM privileges, resulting in privilege escalation. | |
| Title | Open Automation Software Incorrect Execution-Assigned Permissions | |
| Weaknesses | CWE-279 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-12-06T20:43:08.930Z
Reserved: 2024-11-14T17:19:47.353Z
Link: CVE-2024-11220
Updated: 2024-12-06T19:20:30.655Z
Status : Analyzed
Published: 2024-12-06T18:15:22.407
Modified: 2025-01-23T16:54:24.970
Link: CVE-2024-11220
No data.
OpenCVE Enrichment
No data.
EUVD