First published: Thu May 11 2023(Updated: )
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Armorstart St 284ee Firmware | ||
Rockwellautomation Armorstart St 284ee | ||
Rockwellautomation Armorstart St 281e Firmware | ||
Rockwellautomation Armorstart St 281e | ||
All of | ||
Rockwellautomation Armorstart St 284ee Firmware | ||
Rockwellautomation Armorstart St 284ee | ||
All of | ||
Rockwellautomation Armorstart St 281e Firmware | ||
Rockwellautomation Armorstart St 281e |
Customers should disable the webserver during normal use. The webserver is disabled by default and should only be enabled to modify configurations. After modifying configurations, the web server should be disabled.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this cross-site scripting vulnerability is CVE-2023-29026.
The severity rating of CVE-2023-29026 is medium.
The affected software of CVE-2023-29026 is Rockwell Automation's ArmorStart ST product firmware versions 284EE and 281E.
A malicious user with admin privileges and network access can exploit CVE-2023-29026 to view user data and modify the web interface.
Please refer to the reference link provided for information on available fixes or patches for CVE-2023-29026.