Lucene search

K
cvelistRockwellCVELIST:CVE-2023-2913
HistoryJul 18, 2023 - 7:52 p.m.

CVE-2023-2913 Rockwell Automation ThinManager ThinServer Path Traversal Vulnerability

2023-07-1819:52:45
CWE-23
Rockwell
www.cve.org
5
cve-2023-2913
rockwell automation
thinmanager
thinserver
path traversal
vulnerability
https server
remote actor
file system
arbitrary files
malicious user
path manipulation

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

21.1%

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ThinManager ThinServer",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "13.0.0 - 13.0.2"
      },
      {
        "status": "affected",
        "version": "13.1.0"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

21.1%

Related for CVELIST:CVE-2023-2913