Lucene search

K
cvelistRockwellCVELIST:CVE-2023-2913
HistoryJul 18, 2023 - 7:52 p.m.

CVE-2023-2913 Rockwell Automation ThinManager ThinServer Path Traversal Vulnerability

2023-07-1819:52:45
CWE-23
Rockwell
www.cve.org
cve-2023-2913
rockwell automation
thinmanager
thinserver
path traversal
vulnerability
https server
remote actor
file system
arbitrary files
malicious user
path manipulation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

19.0%

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "ThinManager ThinServer",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "13.0.0 - 13.0.2"
      },
      {
        "status": "affected",
        "version": "13.1.0"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

19.0%

Related for CVELIST:CVE-2023-2913