Lucene search

K
cveRockwellCVE-2023-2913
HistoryJul 18, 2023 - 8:15 p.m.

CVE-2023-2913

2023-07-1820:15:09
CWE-23
CWE-22
Rockwell
web.nvd.nist.gov
22
cve-2023
rockwell automation
thinmanager
thinserver
api
https
path traversal
vulnerability
remote actor
privileges
file system
arbitrary files
nvd

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

21.1%

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

Affected configurations

Nvd
Node
rockwellautomationthinmanagerRange13.0.0–13.0.2
VendorProductVersionCPE
rockwellautomationthinmanager*cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ThinManager ThinServer",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "13.0.0 - 13.0.2"
      },
      {
        "status": "affected",
        "version": "13.1.0"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

21.1%

Related for CVE-2023-2913