SB2024112514 - Multiple vulnerabilities in mySCADA myPRO Manager and myPRO Runtime
Published: November 25, 2024 Updated: February 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2024-47407)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) OS Command Injection (CVE-ID: CVE-2024-52034)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Improper Authentication (CVE-ID: CVE-2024-45369)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error when processing authentication requests in the web application. A remote attacker can bypass authentication process and gain unauthorized access to the application.
4) Missing Authentication for Critical Function (CVE-ID: CVE-2024-47138)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to missing authentication for critical function within the administrative interface. A remote attacker can gain access to the target application.
5) Path traversal (CVE-ID: CVE-2024-50054)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to the backend does not sufficiently verify the user-controlled filename parameter. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system.
Remediation
Install update from vendor's website.