CVE-2023-2917

EUVD-2023-34363
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.

  
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
RockwellCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
rockwellautomationthinmanager_thinserver
11.0.0 ≤
𝑥
≤ 11.0.6
rockwellautomationthinmanager_thinserver
11.1.0 ≤
𝑥
≤ 11.1.6
rockwellautomationthinmanager_thinserver
11.2.0 ≤
𝑥
≤ 11.2.7
rockwellautomationthinmanager_thinserver
12.0.0 ≤
𝑥
≤ 12.0.5
rockwellautomationthinmanager_thinserver
12.1.0 ≤
𝑥
≤ 12.1.6
rockwellautomationthinmanager_thinserver
13.0.0 ≤
𝑥
≤ 13.0.2
rockwellautomationthinmanager_thinserver
13.1.0
𝑥
= Vulnerable software versions