CVE-2024-6326
16.07.2024, 17:15
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, whichtemporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.Enginsight
Vendor | Product | Version |
---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.40.0 |
rockwellautomation | factorytalk_system_services | 6.40.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
- CWE-276 - Incorrect Default PermissionsDuring installation, installed file permissions are set to allow anyone to modify those files.