CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
51.6%
In affected versions, a path traversal exists when processing a message in Rockwell Automation’s ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.
Vendor | Product | Version | CPE |
---|---|---|---|
rockwellautomation | thinmanager | * | cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:* |
rockwellautomation | thinmanager | 13.0.0 | cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:* |
rockwellautomation | thinmanager | 13.0.1 | cpe:2.3:a:rockwellautomation:thinmanager:13.0.1:*:*:*:*:*:*:* |
[
{
"defaultStatus": "unaffected",
"product": "ThinManager ThinServer",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "6.x - 10.x"
},
{
"status": "affected",
"version": "11.0.0 - 11.0.5"
},
{
"status": "affected",
"version": "11.1.0 - 11.1.5"
},
{
"status": "affected",
"version": "11.2.0 - 11.2.6"
},
{
"status": "affected",
"version": "12.0.0 - 12.0.4"
},
{
"status": "affected",
"version": "12.1.0 - 12.1.5"
},
{
"status": "affected",
"version": "13.0.0 - 13.0.1"
}
]
}
]