First published: Tue Jul 18 2023(Updated: )
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Thinmanager | >=13.0.0<=13.0.2 |
* Update to the corrected software versions
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2913 is a vulnerability found in Rockwell Automation ThinManager ThinServer that allows remote actors to exploit a path traversal vulnerability when the API feature is enabled.
CVE-2023-2913 has a severity score of 6.5, which is considered high.
To fix CVE-2023-2913, it is recommended to update Rockwell Automation ThinManager ThinServer to version 13.0.2 or later, as this vulnerability has been fixed in that release.
The affected software for CVE-2023-2913 is Rockwell Automation ThinManager ThinServer versions 13.0.0 to 13.0.2.
Yes, you can find additional information about CVE-2023-2913 in the Rockwell Automation knowledgebase article: [https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160)