Loading

SIS Workstation DotNetZip Third-Party Vulnerability CVE-2024-48510

Severity:
High
Advisory ID:
SD1761
Published Date:
November 11, 2025
Last Updated:
November 11, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
No
Corrected:
Yes
Workaround:
No
CVE IDs
CVE-2024-48510
Downloads
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
Summary

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

Product Description

The AADvance-Trusted SIS Workstation from Rockwell Automation is a comprehensive software suite designed for developing and managing safety instrumented system (SIS) applications using Trusted® Series 8000 and AADvance® Series 9000™ controllers, offering graphical tools, IEC 61131-3 language editors, and integrated diagnostics to streamline design, deployment, and maintenance of industrial control systems.

Affected Products and Solution

Affected Product

CVE

Affected Software Version

Corrected in Software Version

 AADvance - Trusted SIS Workstation

CVE-2024-48510

Version 2.00.00 to 2.00.04 inclusive.

 Version 2.01.00 and later

Security Issue Details

Category

Details

CVE ID

CVE-2024-48510

Impact

Directory Traversal vulnerability in DotNetZip v.1.16.0 and before allows a remote attacker to execute arbitrary code via the src/Zip.Shared/ZipEntry.Extract.cs component. A victim opening a malicious file is required for exploitation.

CVSS 3.1 Base Score

8.8/10

CVSS 4.0 Base Score

8.6/10

CWE

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Known Exploited Vulnerability

No (Not listed in KEV database) 

Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices. 

Revision History

Revision

Date

Description

1.0

November 11, 2025

Initial release

Glossary:

·         Arbitrary Code Execution: an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a target process

·         Directory Traversal: also known as path traversal, is a security vulnerability that allows attackers to access files and directories outside the intended scope of a web application or system. This is typically achieved by manipulating input fields—such as URLs or file paths

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the vulnerability policy

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

If you have any questions regarding this disclosure, please contact PSIRT
Email: rasecure@ra.rockwell.com

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation Home
  2. Chevron LeftChevron Left Trust Center
  3. Chevron LeftChevron Left Industrial Security Adv
  4. Chevron LeftChevron Left Industrial Security Advisory Detail
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose