First published: Mon Aug 26 2024(Updated: )
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation ThinServer |
Affected Product First Known in software version Corrected in software version ThinManager® ThinServer™ 11.1.0-11.1.7 11.2.0-11.2.8 12.0.0-12.0.6 12.1.0-12.1.7 13.0.0-13.0.4 13.1.0-13.1.2 13.2.0-13.2.1 11.1.8 11.2.9 12.0.7 12.1.8 13.0.5 13.1.3 13.2.2 Mitigations and Workarounds Customers using the affected software are encouraged to implement our suggested security best practices to minimize the risk of vulnerability. · Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7988 is considered a critical severity vulnerability due to its potential for remote code execution with system privileges.
To fix CVE-2024-7988, apply the latest security patches provided by Rockwell Automation for ThinManager ThinServer.
CVE-2024-7988 allows an attacker to execute arbitrary code on the affected system, potentially leading to unauthorized access and control.
CVE-2024-7988 affects all versions of Rockwell Automation ThinManager ThinServer that lack proper data input validation.
CVE-2024-7988 is a remote code execution vulnerability caused by insufficient validation of input data, allowing code execution with system-level privilege.