First published: Fri Aug 23 2024(Updated: )
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ThinServer | ||
Rockwell Automation ThinManager ThinServer | >=11.1.0<11.1.8 | |
Rockwell Automation ThinManager ThinServer | >=11.2.0<11.2.9 | |
Rockwell Automation ThinManager ThinServer | >=12.0.0<12.0.7 | |
Rockwell Automation ThinManager ThinServer | >=12.1.0<12.1.8 | |
Rockwell Automation ThinManager ThinServer | >=13.0.0<13.0.5 | |
Rockwell Automation ThinManager ThinServer | >=13.1.0<13.1.3 | |
Rockwell Automation ThinManager ThinServer | >=13.2.0<13.2.2 |
Affected Product First Known in software version Corrected in software version ThinManager® ThinServer™ 11.1.0-11.1.7 11.2.0-11.2.8 12.0.0-12.0.6 12.1.0-12.1.7 13.0.0-13.0.4 13.1.0-13.1.2 13.2.0-13.2.1 11.1.8 11.2.9 12.0.7 12.1.8 13.0.5 13.1.3 13.2.2 Mitigations and Workarounds Customers using the affected software are encouraged to implement our suggested security best practices to minimize the risk of vulnerability. · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7986 is considered a high severity vulnerability due to the potential for sensitive information disclosure.
To fix CVE-2024-7986, it is recommended to apply the latest security patches provided by Rockwell Automation for the ThinManager ThinServer.
The impact of CVE-2024-7986 allows threat actors to read arbitrary files, which can lead to unauthorized access to sensitive data.
Organizations using Rockwell Automation ThinManager ThinServer are affected by CVE-2024-7986.
Currently, no specific workaround is provided for CVE-2024-7986, so it is essential to apply the recommended updates.