Lucene search

K
cvelistRockwellCVELIST:CVE-2023-2637
HistoryJun 13, 2023 - 8:15 p.m.

CVE-2023-2637 Rockwell Automation FactoryTalk System Services Vulnerable To Use Of Hard-Coded Cryptographic Key

2023-06-1320:15:07
CWE-321
Rockwell
www.cve.org
rockwell automation
factorytalk system services
hard-coded cryptographic key
privilege escalation
administrator cookies
policy manager database
user interaction

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H

8.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Rockwell Automation’s FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.Β  Hard-coded cryptographic key may lead to privilege escalation.Β  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "FactoryTalk System Services",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "<= 6.20"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H

8.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2023-2637