Lucene search

K
cveRockwellCVE-2024-6326
HistoryJul 16, 2024 - 5:15 p.m.

CVE-2024-6326

2024-07-1617:15:12
CWE-269
Rockwell
web.nvd.nist.gov
24
vulnerability
sensitive information exposure
rockwell automation
factorytalk® system service
malicious user
backup process
restore process
private keys
passwords
pre-shared keys
database folders

CVSS4

1.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

ACTIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/SC:H/VI:N/SI:N/VA:N/SA:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.3%

An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "FactoryTalk® System Services (installed via FTPM)",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "v6.40"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "FactoryTalk® Policy Manager (FTPM)",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "v6.40"
      }
    ]
  }
]

CVSS4

1.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

ACTIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/SC:H/VI:N/SI:N/VA:N/SA:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.3%

Related for CVE-2024-6326