Lucene search

K
nvd[email protected]NVD:CVE-2023-2637
HistoryJun 13, 2023 - 9:15 p.m.

CVE-2023-2637

2023-06-1321:15:09
CWE-321
CWE-798
web.nvd.nist.gov
rockwell automation
factorytalk
system services
cryptographic key
administrator cookie
privilege escalation
local user
factorytalk policy manager
database
threat actor
security policy model

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Rockwell Automation’s FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.Β  Hard-coded cryptographic key may lead to privilege escalation.Β  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

Affected configurations

NVD
Node
rockwellautomationfactorytalk_policy_managerMatch6.11.0
OR
rockwellautomationfactorytalk_system_servicesMatch6.11.0

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for NVD:CVE-2023-2637