Sploit.io - Search

Product: B&R APROL, version: >= R4.4, < 4.4-00P5

CVE-2024-45480

Severity: Unknown

Description: An improper control of generation of code ('Code Injection') vulnerability in the AprolCreateReport component of B&R APROL <4.4-00P5 may allow an unauthenticated network-based attacker to read files from the local system.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001470000
  • Percentile: 0.347030000
  • Date: 2026-05-03

ExploitDB

No data available.

HackerOne Data

  • Rank: 9242
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • B&R Industrial Automation B&R APROL - Versions: R4.4

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2024-45480 is a code injection flaw within the AprolCreateReport component of B&R APROL, versions prior to 4.4-00P5. This allows an unauthenticated network-based attacker to potentially read files from the local system. The CVSS v4.0 score is 9.2 (Critical), indicating a significant risk. The vulnerability’s nature – code injection – suggests a relatively straightforward exploit, especially given it requires no authentication. Business impact could be substantial. Depending on the files accessible, attackers could exfiltrate sensitive data like configuration files, process data, or even credentials stored on the system. This could lead to operational disruption, loss of intellectual property, or compromise of the industrial control system itself. The likelihood of exploitation is moderate to high, as the vulnerability is network-accessible and requires minimal attacker effort. Confidentiality is the primary impact, as the attacker is reading files, although depending on the contents of those files, integrity and availability could also be affected.

    2. Potential Attack Scenarios
    An attacker, leveraging network access to a system running a vulnerable version of B&R APROL, could craft a malicious request to the AprolCreateReport component. This request would be designed to inject code that forces the system to read a specific file, for example, the system’s password file (/etc/shadow on Linux systems, or a similar equivalent). The attacker would then analyze the output of the report generated by AprolCreateReport to retrieve the contents of the targeted file. This scenario assumes the APROL system has read access to the target file. The attack vector is network-based, requiring only connectivity to the affected system. The process involves sending a carefully crafted request, observing the generated report, and extracting the desired file contents. The outcome could be the compromise of user accounts or the discovery of sensitive configuration information, leading to further exploitation.

    3. Mitigation Recommendations
    The primary mitigation is to upgrade B&R APROL to version 4.4-00P5 or later. This version includes the fix for the code injection vulnerability. Patching should be prioritized, especially for systems directly exposed to the network. Secondary mitigations include network segmentation to limit the blast radius if the vulnerability is exploited. Monitor network traffic for unusual activity related to the APROL system, and consider implementing input validation on the AprolCreateReport component if patching isn't immediately possible. Refer to the official B&R Automation advisory for detailed patching instructions: https://www.br-automation.com/fileadmin/SA24P015-77573c08.pdf. Consider reviewing file permissions to limit access to sensitive files, even if they are readable via the code injection vulnerability.

    4. Executive Summary
    B&R APROL, a critical component in many industrial automation systems, is vulnerable to a code injection flaw (CVE-2024-45480) that allows attackers to read files from the local system without authentication. This could lead to the theft of sensitive data, potential operational disruptions, and compromise of the overall control system. The vulnerability is considered critical with a CVSS score of 9.2. The most effective mitigation is to upgrade to APROL version 4.4-00P5 as soon as possible. Delaying patching increases the risk of data exfiltration and potential system compromise. This vulnerability should be prioritized, as it directly impacts the confidentiality of data and potentially the integrity and availability of the industrial process managed by B&R APROL. Proactive patching and monitoring are essential to minimize risk and ensure continued operations.

    CVE-2024-45481

    Severity: Unknown

    Description: An Incomplete Filtering of Special Elements vulnerability in scripts using the SSH server on B&R APROL <4.4-00P5 may allow an authenticated local attacker to authenticate as another legitimate user.

    CVSS Score: N/A

    Affected Products:

    • B&R Industrial Automation B&R APROL - Versions: R4.4

    References:

    CVE-2024-8315

    Severity: Unknown

    Description: An Improper Handling of Insufficient Permissions or Privileges vulnerability in scripts used in B&R APROL <4.4-00P5 may allow an authenticated local attacker to read credential information.

    CVSS Score: N/A

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.000600000
    • Percentile: 0.186640000
    • Date: 2026-04-29

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9223
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • B&R Industrial Automation B&R APROL - Versions: R4.4

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, identified as CVE-2024-8315, is an Improper Handling of Insufficient Permissions or Privileges within scripts used in B&R APROL versions prior to 4.4-00P5. This allows an authenticated local attacker to read credential information. The CVSS v4.0 score is 6.8 (Medium severity) indicating a moderate risk. The vulnerability impacts confidentiality primarily, as credential information can be exposed. Integrity and availability impacts are currently considered none, but potential compromise of credentials could lead to further integrity or availability issues. Likelihood of exploitation is moderate, as it requires local access and authentication, but is relatively easy to exploit given the low attack complexity. The business impact could range from minor inconvenience if low-privilege accounts are compromised, to significant impact if critical system accounts or service accounts are exposed, potentially leading to wider system compromise and operational disruption. The EPSS score of 0.000600000 suggests a relatively low, but non-negligible, probability of exploitation in the wild.

      2. Potential Attack Scenarios
      An attacker with local access to a system running B&R APROL (e.g., a technician, or someone who has compromised a user account with local access) could leverage this vulnerability to read credential information stored within the APROL scripts. The attacker could then use these credentials to gain elevated privileges or access other connected systems within the industrial control network.
      Attack Vector: Local Access
      Attack Process: The attacker, already authenticated to the system, executes the vulnerable APROL scripts. These scripts, due to insufficient permissions checks, allow the attacker to read credential information stored within them. The attacker then analyzes the extracted credentials, identifying those applicable to other systems or services.
      Potential Outcomes: The attacker uses the compromised credentials to access critical systems, potentially manipulating process control, disrupting production, or exfiltrating sensitive data. This could result in downtime, financial loss, or even safety incidents depending on the role of APROL within the industrial process.

      3. Mitigation Recommendations
      The primary mitigation is to upgrade B&R APROL to version 4.4-00P5 or later. This version includes the necessary fixes to properly handle permissions and prevent credential leakage.
      Immediate Actions:
      Patching: Upgrade to B&R APROL version 4.4-00P5 or later as soon as possible.
      Credential Rotation: After patching, consider rotating credentials potentially exposed by the vulnerability as a precautionary measure.
      Least Privilege: Review local access permissions and ensure users have only the necessary privileges required for their roles.
      Monitoring: Monitor system logs for unusual activity or authentication attempts following the patch deployment.
      Relevant Resources:
      B&R Automation Security Advisory: https://www.br-automation.com/fileadmin/SA24P015-77573c08.pdf
      PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2024-8315

      4. Executive Summary
      B&R APROL, a software used in industrial automation, has a vulnerability that allows an authenticated local attacker to read credential information. This means someone with access to the system could potentially steal usernames and passwords. The risk is moderate, and while not immediately catastrophic, a successful attack could lead to disruption of operations, financial loss, or even safety incidents. The most effective way to address this is to upgrade B&R APROL to the latest version (4.4-00P5 or later). This is a priority update, and should be scheduled as soon as possible to minimize the risk of credential compromise and potential impact to our industrial processes. Prompt action will protect our systems and maintain reliable operations.