ID

VAR-202410-0679


CVE

CVE-2024-7847


DESCRIPTION

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

Trust: 1.0

sources: NVD: CVE-2024-7847

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:rslogix 5scope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:rslogix 500scope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:rslogix micro starter litescope:eqversion: -

Trust: 1.0

vendor:rockwellautomationmodel:rslogix micro developerscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2024-7847

CVSS

SEVERITY

CVSSV2

CVSSV3

PSIRT@rockwellautomation.com: CVE-2024-7847
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-7847
value: HIGH

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2024-7847
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 6.0
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-7847
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2024-7847 // NVD: CVE-2024-7847

PROBLEMTYPE DATA

problemtype:CWE-345

Trust: 1.0

sources: NVD: CVE-2024-7847

EXTERNAL IDS

db:NVDid:CVE-2024-7847

Trust: 1.0

sources: NVD: CVE-2024-7847

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1701.html

Trust: 1.0

sources: NVD: CVE-2024-7847

SOURCES

db:NVDid:CVE-2024-7847

LAST UPDATE DATE

2025-09-30T23:41:29.784000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2024-7847date:2025-09-29T17:27:33.893

SOURCES RELEASE DATE

db:NVDid:CVE-2024-7847date:2024-10-14T14:15:12.020