First published: Fri Oct 27 2023(Updated: )
Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk® Services Platform web service and then use the token to log in into FactoryTalk® Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk® Services Platform web service.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.80 |
* Install the respective FactoryTalk Services Version https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx that remediates the issue. * QA43240 - Recommended Security Guidelines from Rockwell Automation https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46290 is a vulnerability in Rockwell Automation FactoryTalk Services Platform that allows an unauthenticated attacker to obtain elevated privileges.
The severity of CVE-2023-46290 is high, with a CVSS score of 8.1.
The attacker can exploit CVE-2023-46290 by obtaining a local Windows OS user token through the FactoryTalk Services Platform web service and then using that token to log in to FactoryTalk Services Platform.
FactoryTalk Services Platform version up to and excluding 2.80 is affected by CVE-2023-46290.
To fix CVE-2023-46290, it is recommended to upgrade to a version of FactoryTalk Services Platform that is higher than 2.80.