Lucene search

K
vulnrichmentRockwellVULNRICHMENT:CVE-2024-5989
HistoryJun 25, 2024 - 4:01 p.m.

CVE-2024-5989 Rockwell Automation ThinManager® ThinServer™ Improper Input Validation Vulnerability

2024-06-2516:01:39
CWE-20
Rockwell
github.com
9
cve-2024-5989
rockwell automation
thinmanager
thinserver
input validation
vulnerability
sql injection
remote code execution

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.8

Confidence

Low

EPSS

0.001

Percentile

31.8%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:rockwellautomation:thinmanager:11.1.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:11.2.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:12.0.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:12.1.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:13.1.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:rockwellautomation:thinmanager:13.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "rockwellautomation",
    "product": "thinmanager",
    "versions": [
      {
        "status": "affected",
        "version": "11.1.0",
        "lessThan": "11.1.8",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "11.2.0",
        "lessThan": "11.2.9",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "12.0.0",
        "lessThan": "12.0.7",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "12.1.0",
        "lessThan": "12.1.8",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "13.0.0",
        "lessThan": "13.0.4",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "13.1.0",
        "lessThan": "13.1.2",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "13.2.0",
        "lessThan": "13.2.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

8.8

Confidence

Low

EPSS

0.001

Percentile

31.8%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-5989