First published: Tue Jun 13 2023(Updated: )
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected. Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk Policy Manager | =6.11.0 | |
Rockwellautomation Factorytalk System Services | =6.11.0 |
Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx or later which has been patched to mitigate these issues.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2638 is a vulnerability in Rockwell Automation's FactoryTalk System Services that allows the loading of malicious configuration archives.
CVE-2023-2638 allows a local, authenticated non-admin user to load malicious configuration archives.
CVE-2023-2638 has a severity rating of medium.
To fix CVE-2023-2638, Rockwell Automation recommends upgrading to a non-vulnerable version of FactoryTalk System Services and ensuring that backup configuration archives are password protected.
More information about CVE-2023-2638 can be found at the following link: [https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683)