First published: Wed Mar 22 2023(Updated: )
In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ThinManager | >=11.0.0<11.0.5 | |
Rockwell Automation ThinManager | >=11.1.0<11.1.5 | |
Rockwell Automation ThinManager | >=11.2.0<11.2.6 | |
Rockwell Automation ThinManager | >=12.0.0<12.0.3 | |
Rockwell Automation ThinManager | >=12.1.0<12.1.4 | |
Rockwell Automation ThinManager | =13.0.0 |
Customers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-27857.
CVE-2023-27857 has a severity rating of 7.5 (High).
CVE-2023-27857 occurs due to a heap-based buffer over-read condition in Rockwell Automation's ThinManager ThinServer.
ThinManager ThinServer versions 11.0.0 to 11.0.5, 11.1.0 to 11.1.5, 11.2.0 to 11.2.6, 12.0.0 to 12.0.3, 12.1.0 to 12.1.4, and 13.0.0 are affected by CVE-2023-27857.
An unauthenticated remote attacker can exploit CVE-2023-27857 to crash ThinServer.exe.
No, authentication is not required to exploit CVE-2023-27857.
To fix CVE-2023-27857, It is recommended to update ThinManager ThinServer to a version that is not affected by this vulnerability.