Lucene search

K
cvelistRockwellCVELIST:CVE-2023-46290
HistoryOct 27, 2023 - 6:10 p.m.

CVE-2023-46290 Rockwell Automation FactoryTalk Services Platform Elevated Privileges Vulnerability

2023-10-2718:10:50
CWE-287
Rockwell
www.cve.org
rockwell automation
factorytalk services platform
vulnerability
inadequate code logic
web service
windows os
user token
threat actor
exploit

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.6%

Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk® Services Platform web service and then use the token to log in into FactoryTalk® Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk® Services Platform web service.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "FactoryTalk® Services Platform",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "versions before 2.80"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.6%

Related for CVELIST:CVE-2023-46290