First published: Tue Jun 25 2024(Updated: )
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ThinManager ThinServer | >=11.1.0<11.1.8 | |
Rockwell Automation ThinManager ThinServer | >=11.2.0<11.2.9 | |
Rockwell Automation ThinManager ThinServer | >=12.0.0<12.0.7 | |
Rockwell Automation ThinManager ThinServer | >=12.1.0<12.1.8 | |
Rockwell Automation ThinManager ThinServer | >=13.0.0<13.0.5 | |
Rockwell Automation ThinManager ThinServer | >=13.1.0<13.1.3 | |
Rockwell Automation ThinManager ThinServer | >=13.2.0<13.2.2 | |
Rockwell Automation ThinServer | >=11.1.0<11.1.8 | |
Rockwell Automation ThinServer | >=11.2.0<11.2.9 | |
Rockwell Automation ThinServer | >=12.0.0<12.0.7 | |
Rockwell Automation ThinServer | >=12.1.0<12.1.8 | |
Rockwell Automation ThinServer | >=13.0.0<13.0.5 | |
Rockwell Automation ThinServer | >=13.1.0<13.1.3 | |
Rockwell Automation ThinServer | >=13.2.0<13.2.2 |
Affected Product CVE First Known in software version Corrected in software version ( Available Here https://thinmanager.com/downloads/index.php ) ThinManager® ThinServer™ 2024-5988 2024-5989 11.1.0 11.2.0 12.0.0 12.1.0 13.0.0 13.1.0 13.2.0 11.1.8 https://thinmanager.com/downloads/index.php 11.2.9 https://thinmanager.com/downloads/index.php 12.0.7 https://thinmanager.com/downloads/index.php 12.1.8 https://thinmanager.com/downloads/index.php 13.0.5 https://thinmanager.com/downloads/index.php 13.1.3 https://thinmanager.com/downloads/index.php 13.2.2 https://thinmanager.com/downloads/index.php 2024-5990 11.1.0 11.2.0 12.0.0 12.1.0 13.0.0 13.1.0 11.1.8 https://thinmanager.com/downloads/index.php 11.2.9 https://thinmanager.com/downloads/index.php 12.0.7 https://thinmanager.com/downloads/index.php 12.1.8 https://thinmanager.com/downloads/index.php 13.0.4 https://thinmanager.com/downloads/index.php 13.1.2 https://thinmanager.com/downloads/index.php Customers using the affected software are encouraged to apply the risk mitigations from the list below, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the potential risk of vulnerability. · Update to the corrected software versions via the ThinManager® Downloads Site https://thinmanager.com/downloads/index.php · Limit remote access for TCP Port 2031 to known thin clients and ThinManager® servers. · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5989 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-5989, update Rockwell Automation ThinManager and ThinServer to the latest patched versions as provided by the vendor.
CVE-2024-5989 affects specific versions of Rockwell Automation ThinManager and ThinServer software, specifically versions between 11.1.0 to 13.2.2.
CVE-2024-5989 can be exploited by unauthenticated threat actors who can send malicious input to the affected systems.
CVE-2024-5989 enables SQL injection attacks that could lead to remote code execution on the vulnerable systems.