CVE-2023-2917

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.

  
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
RockwellCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
rockwellautomationthinmanager_thinserver
11.0.0 ≤
𝑥
≤ 11.0.6
rockwellautomationthinmanager_thinserver
11.1.0 ≤
𝑥
≤ 11.1.6
rockwellautomationthinmanager_thinserver
11.2.0 ≤
𝑥
≤ 11.2.7
rockwellautomationthinmanager_thinserver
12.0.0 ≤
𝑥
≤ 12.0.5
rockwellautomationthinmanager_thinserver
12.1.0 ≤
𝑥
≤ 12.1.6
rockwellautomationthinmanager_thinserver
13.0.0 ≤
𝑥
≤ 13.0.2
rockwellautomationthinmanager_thinserver
13.1.0
𝑥
= Vulnerable software versions