Lucene search

K
cveRockwellCVE-2024-5989
HistoryJun 25, 2024 - 4:15 p.m.

CVE-2024-5989

2024-06-2516:15:25
CWE-20
Rockwell
web.nvd.nist.gov
48
105
improper input validation
sql injection
remote code execution
rockwell automation
thinmanager thinserver

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

9.1

Confidence

Low

EPSS

0.001

Percentile

31.8%

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Affected configurations

Nvd
Node
rockwellautomationthinmanagerRange11.1.011.1.8
OR
rockwellautomationthinmanagerRange11.2.011.2.9
OR
rockwellautomationthinmanagerRange12.0.012.0.7
OR
rockwellautomationthinmanagerRange12.1.012.1.8
OR
rockwellautomationthinmanagerRange13.0.013.0.5
OR
rockwellautomationthinmanagerRange13.1.013.1.3
OR
rockwellautomationthinmanagerRange13.2.013.2.2
OR
rockwellautomationthinserverRange11.1.011.1.8
OR
rockwellautomationthinserverRange11.2.011.2.9
OR
rockwellautomationthinserverRange12.0.012.0.7
OR
rockwellautomationthinserverRange12.1.012.1.8
OR
rockwellautomationthinserverRange13.0.013.0.5
OR
rockwellautomationthinserverRange13.1.013.1.3
OR
rockwellautomationthinserverRange13.2.013.2.2
VendorProductVersionCPE
rockwellautomationthinmanager*cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*
rockwellautomationthinserver*cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ThinManager® ThinServer™",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "11.0.0"
      },
      {
        "status": "affected",
        "version": "11.2.0"
      },
      {
        "status": "affected",
        "version": "12.0.0"
      },
      {
        "status": "affected",
        "version": "12.1.0"
      },
      {
        "status": "affected",
        "version": "13.0.0"
      },
      {
        "status": "affected",
        "version": "13.1.0"
      },
      {
        "status": "affected",
        "version": "13.2.0"
      }
    ]
  }
]

Social References

More

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

9.1

Confidence

Low

EPSS

0.001

Percentile

31.8%

Related for CVE-2024-5989