First published: Mon Aug 26 2024(Updated: )
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ThinServer |
ffected Product First Known in software version Corrected in software version ThinManager® ThinServer™ 11.1.0-11.1.7 11.2.0-11.2.8 12.0.0-12.0.6 12.1.0-12.1.7 13.0.0-13.0.4 13.1.0-13.1.2 13.2.0-13.2.1 11.1.8 11.2.9 12.0.7 12.1.8 13.0.5 13.1.3 13.2.2 Mitigations and Workarounds Customers using the affected software are encouraged to implement our suggested security best practices to minimize the risk of vulnerability. · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7987 has a high severity rating due to its potential for remote code execution with system privileges.
To remediate CVE-2024-7987, update the Rockwell Automation ThinManager ThinServer to the latest version provided by the vendor.
CVE-2024-7987 specifically affects Rockwell Automation ThinManager ThinServer.
Yes, CVE-2024-7987 can be exploited remotely by a threat actor to execute arbitrary code.
The potential impacts of CVE-2024-7987 include unauthorized access and execution of malicious code within the affected system.