First published: Tue Mar 21 2023(Updated: )
In affected versions, path traversal exists when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Thinmanager | >=6.0.0<=10.0.2 | |
Rockwellautomation Thinmanager | >=11.0.0<=11.0.5 | |
Rockwellautomation Thinmanager | >=11.1.0<=11.1.5 | |
Rockwellautomation Thinmanager | >=11.2.0<=11.2.6 | |
Rockwellautomation Thinmanager | >=12.0.0<=12.0.4 | |
Rockwellautomation Thinmanager | >=12.1.0<=12.1.5 | |
Rockwellautomation Thinmanager | =13.0.0 | |
Rockwellautomation Thinmanager | =13.0.1 |
Customers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-27856.
The affected software is Rockwell Automation's ThinManager ThinServer.
An unauthenticated remote attacker can exploit this vulnerability by performing a path traversal attack when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer.
The severity of this vulnerability is high, with a CVSS score of 7.5.
To fix this vulnerability, users should update to a version of ThinManager ThinServer that is not affected by the vulnerability. Refer to the vendor's website for more information.