Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.ROCKWELL_THINMANAGER_THINSERVER_CVE-2024-5990.NASL
HistoryJun 25, 2024 - 12:00 a.m.

Rockwell Automation ThinManager ThinServer Improper Input Validation (CVE-2024-5990)

2024-06-2500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
rockwell automation
thinmanager
thinserver
improper input validation
cve-2024-5990
denial-of-service

8.7 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

The version of Rockwell Automation ThinManager ThinServer installed on the remote host is 11.1.x prior to 11.1.8, 11.2.x prior to 11.2.9, 12.0.x prior to 12.0.7, 12.1.x prior to 12.1.8, 13.0.x prior to 13.0.4, 13.1.x prior to 13.1.2.
It is therefore, affected by an improper input validation vulnerability:

  • Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within ThinServer and cause a denial-of-service condition on the affected device. Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(200986);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/26");

  script_cve_id("CVE-2024-5990");

  script_name(english:"Rockwell Automation ThinManager ThinServer Improper Input Validation (CVE-2024-5990)");

  script_set_attribute(attribute:"synopsis", value:
"The Rockwell Automation ThinManager/ThinServer is affected by an improper input validation vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Rockwell Automation ThinManager ThinServer installed on the remote host is 11.1.x prior to 11.1.8, 
11.2.x prior to 11.2.9, 12.0.x prior to 12.0.7, 12.1.x prior to 12.1.8, 13.0.x prior to 13.0.4, 13.1.x prior to 13.1.2.
It is therefore, affected by an improper input validation vulnerability:

  - Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor 
    thread within ThinServer and cause a denial-of-service condition on the affected device. 
  
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cbdb422a");
  script_set_attribute(attribute:"see_also", value:"https://www.tenable.com/security/research/tra-2024-24");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Rockwell Automation ThinManager ThinServer 11.1.8, 11.2.9, 12.0.7, 12.1.8, 13.0.4, 13.1.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-5990");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/06/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/06/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/06/25");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:rockwellautomation:thinmanager");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"SCADA");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("rockwell_thinmanager_thinserver_win_installed.nbin");
  script_require_keys("SMB/Registry/Enumerated", "installed_sw/Rockwell ThinManager ThinServer");
  script_require_ports(139, 445);

  exit(0);
}

include('vcf.inc');

var app_info = vcf::get_app_info(app: 'Rockwell ThinManager ThinServer');

var constraints = [
  { 'min_version' : '11.1.0', 'fixed_version' : '11.1.8' },
  { 'min_version' : '11.2.0', 'fixed_version' : '11.2.9' },
  { 'min_version' : '12.0.0', 'fixed_version' : '12.0.7' },
  { 'min_version' : '12.1.0', 'fixed_version' : '12.1.8' },
  { 'min_version' : '13.0.0', 'fixed_version' : '13.0.4' },
  { 'min_version' : '13.1.0', 'fixed_version' : '13.1.2' }
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_HOLE
);
VendorProductVersionCPE
rockwellautomationthinmanagercpe:/a:rockwellautomation:thinmanager

8.7 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/SC:N/VI:N/SI:N/VA:H/SA:N

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for ROCKWELL_THINMANAGER_THINSERVER_CVE-2024-5990.NASL