First published: Tue Jul 11 2023(Updated: )
The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Enhanced Him | =1.001 |
* Upgrade to version 1.002 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx which mitigates this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2746 is a vulnerability in the Rockwell Automation Enhanced HIM software that allows for a Cross Site Request Forgery (CSRF) attack.
CVE-2023-2746 has a severity rating of critical (9).
The Rockwell Automation Enhanced HIM software version 1.001 is affected by CVE-2023-2746.
CVE-2023-2746 can be exploited through a Cross Site Request Forgery (CSRF) attack.
To fix CVE-2023-2746, it is recommended to apply the necessary updates and patches provided by Rockwell Automation.