Lucene search

K
vulnrichmentRockwellVULNRICHMENT:CVE-2024-6326
HistoryJul 16, 2024 - 4:51 p.m.

CVE-2024-6326 Rockwell Automation Unsecured Private Keys in FactoryTalk® System Services

2024-07-1616:51:18
CWE-269
Rockwell
github.com
2
rockwell automation
sensitive information
exposure
factorytalk® system
private keys
vulnerability
backup
restore
permissions
impersonation

CVSS4

1.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

ACTIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/SC:H/VI:N/SI:N/VA:N/SA:N

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.

CNA Affected

[
  {
    "vendor": "Rockwell Automation",
    "product": "FactoryTalk® System Services (installed via FTPM)",
    "versions": [
      {
        "status": "affected",
        "version": "v6.40"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Rockwell Automation",
    "product": "FactoryTalk® Policy Manager (FTPM)",
    "versions": [
      {
        "status": "affected",
        "version": "v6.40"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS4

1.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

ACTIVE

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/SC:H/VI:N/SI:N/VA:N/SA:N

AI Score

6.4

Confidence

High

EPSS

0

Percentile

9.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-6326