Vulnerabilites related to rockwellautomation - factorytalk_policy_manager
cve-2023-2639
Vulnerability from cvelistv5
Published
2023-06-13 20:28
Modified
2025-01-02 20:56
Severity ?
EPSS score ?
Summary
The underlying feedback mechanism of
Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device. This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Rockwell Automation | FactoryTalk System Services |
Version: <= 6.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:26:09.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-2639", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:56:10.889007Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:56:26.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FactoryTalk System Services", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c= 6.20" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sharon Brizinov of Claroty Research - Team82" } ], "datePublic": "2023-06-13T14:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe underlying feedback mechanism of \n\nRockwell Automation\u0027s\u0026nbsp;FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.\u0026nbsp; T\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehis may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\n\n\u003c/span\u003e" } ], "value": "The underlying feedback mechanism of \n\nRockwell Automation\u0027s\u00a0FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.\u00a0 This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.\u00a0\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-466", "descriptions": [ { "lang": "en", "value": "CAPEC-466 Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T20:28:28.153Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCustomers using the affected software are encouraged to apply the risk mitigations, if possible.\u003c/span\u003e\u003cul\u003e\u003cli\u003eUpgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=61050,59723\"\u003e6.30.00\u003c/a\u003e\u0026nbsp;or later which has been patched to mitigate these issues.\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "\nCustomers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0or later which has been patched to mitigate these issues.\n\n\n\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation FactoryTalk System Services Vulnerable to Sensitive Information Disclosure", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-2639", "datePublished": "2023-06-13T20:28:28.153Z", "dateReserved": "2023-05-10T20:31:40.821Z", "dateUpdated": "2025-01-02T20:56:26.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6325
Vulnerability from cvelistv5
Published
2024-07-16 16:43
Modified
2024-08-01 21:33
Severity ?
EPSS score ?
Summary
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | FactoryTalk® System Services (installed via FTPM) |
Version: 6.40 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6325", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T18:04:54.518272Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T15:47:32.018Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.423Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FactoryTalk\u00ae System Services (installed via FTPM)", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "6.40" } ] }, { "defaultStatus": "unaffected", "product": "FactoryTalk\u00ae Policy Manager (FTPM)", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v6.40" } ] } ], "datePublic": "2024-07-11T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe v6.40 release of Rockwell Automation FactoryTalk\u00ae Policy Manager\u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u0026nbsp;allowed \u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethe private keys to be insecurely stored with read and execute privileges for the Windows group, \u2018Everyone\u2019. These keys are used to generate digital certificates and pre-shared keys. This vulnerability could allow a malicious user with access to the machine to obtain private keys. If obtained, a malicious user could impersonate resources on the secured network. \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003eFor customers\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;using FactoryTalk\u00ae Policy Manager v6.40 who mitigated\u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u0026nbsp;\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html\"\u003eCVE-2021-22681\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;and \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html\"\u003eCVE-2022-1161\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;by implementing CIP security and did not update to the versions of the software\u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u0026nbsp;\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethat contain the remediation, this vulnerability could allow a threat actor to exploit \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html\"\u003eCVE-2022-1161\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;and \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html\"\u003eCVE-2022-1161.\u003c/a\u003e\n\n" } ], "value": "The v6.40 release of Rockwell Automation FactoryTalk\u00ae Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html \u00a0and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html \u00a0by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html \u00a0and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html" } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122 Privilege Abuse" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-16T16:43:44.494Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eUsers using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Clear CIP Security configurations from devices and from FactoryTalk\u00ae Policy Manager\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Update FactoryTalk\u00ae System Services and FactoryTalk\u00ae Policy Manager to v6.40.01\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Redeploy CIP Security Policy \u003c/p\u003e\u003cp\u003eDetailed steps are below \u003cb\u003e(FactoryTalk System Services (FTSS) is updated through the installation of FactoryTalk Policy Manager (FTPM)\u003c/b\u003e\u003c/p\u003e\u003cp\u003e1) \u0026nbsp; \u0026nbsp; Remove deployed security policy from all devices using FactoryTalk\u00ae Policy Manager (FTPM):\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; Open FTPM.\u003c/p\u003e\u003cp\u003eb. \u0026nbsp; \u0026nbsp; \u0026nbsp; Document all Zone\u2019s security settings and all Conduit\u2019s settings as you must re-create them after updating FTPM.\u003c/p\u003e\u003cp\u003ec. \u0026nbsp; \u0026nbsp; \u0026nbsp; Change all devices port\u2019s Policies \u0026gt; Zone values to the \u201cUnassigned\u201d Zone.\u003c/p\u003e\u003cp\u003ed. \u0026nbsp; \u0026nbsp; \u0026nbsp; Delete all zones and conduits.\u003c/p\u003e\u003cp\u003ee. \u0026nbsp; \u0026nbsp; \u0026nbsp; Deploy (CIP). Ensure that all endpoints were reset successfully.\u003c/p\u003e\u003cp\u003ef. \u0026nbsp; \u0026nbsp; \u0026nbsp; [migrating from v6.40 only] Deploy (OPC UA). Ensure all endpoints were reset successfully.\u003c/p\u003e\u003cp\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; i. \u0026nbsp; \u0026nbsp; For any OPC UA clients, perform whatever steps are required by those clients to remove the previously applied certificates.\u003c/p\u003e\u003cp\u003eg. \u0026nbsp; \u0026nbsp; \u0026nbsp; Close FTPM\u003c/p\u003e\u003cp\u003e2) \u0026nbsp; \u0026nbsp; Delete the \\FTSS_backup folder:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell\\RNAServer\\Global\\RnaStore\\FTSS_Backup\u003c/p\u003e\u003cp\u003e3) \u0026nbsp; \u0026nbsp; Delete the \\keystore folder:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\keystore\u003c/p\u003e\u003cp\u003e4) \u0026nbsp; \u0026nbsp; Delete any backup copies of the \\keystore folder. They will be named the same as the \\keystore folder but with a suffix appended to it, like:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ keystore_source_2024_04_25_12_25_38_541566\u003c/p\u003e\u003cp\u003e5) \u0026nbsp; \u0026nbsp; Delete the PSKs.json file:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\PSKs.json\u003c/p\u003e\u003cp\u003e6) \u0026nbsp; \u0026nbsp; Delete any backup copies of the PSKs.json file. They will be named the same as the PSKs.json file but with a suffix appended to it, like:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ PSKs.json_source_2024_05_17_07_38_25_200356\u003c/p\u003e\u003cp\u003e7) \u0026nbsp; \u0026nbsp; Install FactoryTalk\u00ae Policy Manager version 6.40.01.\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; Restart the computer when prompted at the end of the install.\u003c/p\u003e\u003cp\u003e8) \u0026nbsp; \u0026nbsp; Open FTPM. FTPM will attempt to connect to the FactoryTalk\u00ae System Services web server before proceeding.\u003c/p\u003e\u003cp\u003e9) \u0026nbsp; \u0026nbsp; If FTPM could not successfully connect to FactoryTalk\u00ae System Services (FTSS), it is because the FTSS service hasn\u2019t started yet. It will eventually start or else you can start the FTSS service manually in Windows Services.\u003c/p\u003e\u003cp\u003e10) \u0026nbsp; Re-create the original Zones.\u003c/p\u003e\u003cp\u003e11) \u0026nbsp; Move the devices from the unassigned Zone back to their original zones.\u003c/p\u003e\u003cp\u003e12) \u0026nbsp; Re-create the original Conduits.\u003c/p\u003e\u003cp\u003e13) \u0026nbsp; Deploy (CIP endpoints).\u003c/p\u003e\u003cp\u003e14) \u0026nbsp; [migrating from v6.40 only] Deploy (OPC UA endpoints).\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; For any OPC UA client endpoints, manually apply the newly generated certificates from this deploy.\u003c/p\u003e\u003cp\u003eAdditionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability.\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\"\u003eSecurity Best Practices\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Users using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.\n\n Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight" } ], "source": { "advisory": "SD1678", "discovery": "INTERNAL" }, "title": "Rockwell Automation Unsecured Private Keys in FactoryTalk\u00ae System Services", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2024-6325", "datePublished": "2024-07-16T16:43:44.494Z", "dateReserved": "2024-06-25T15:13:41.907Z", "dateUpdated": "2024-08-01T21:33:05.423Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6326
Vulnerability from cvelistv5
Published
2024-07-16 16:51
Modified
2024-08-01 21:33
Severity ?
EPSS score ?
Summary
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Rockwell Automation | FactoryTalk® System Services (installed via FTPM) |
Version: v6.40 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6326", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T17:49:58.674657Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-16T17:50:07.305Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FactoryTalk\u00ae System Services (installed via FTPM)", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v6.40" } ] }, { "defaultStatus": "unaffected", "product": "FactoryTalk\u00ae Policy Manager (FTPM)", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "v6.40" } ] } ], "datePublic": "2024-07-11T13:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk\u00ae System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which\u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u0026nbsp;temporarily \u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eexposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.\u003c/span\u003e\n\n" } ], "value": "An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk\u00ae System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which\u00a0temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network." } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122 Privilege Abuse" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 1.8, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-16T16:51:18.320Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eUsers using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.\u003c/p\u003e\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Clear CIP Security configurations from devices and from FactoryTalk\u00ae Policy Manager\u003c/a\u003e\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Update FactoryTalk\u00ae System Services and FactoryTalk\u00ae Policy Manager to v6.40.01\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; Redeploy CIP Security Policy \u003c/p\u003e\u003cp\u003eDetailed steps are below \u003cb\u003e(FactoryTalk System Services (FTSS) is updated through the installation of FactoryTalk Policy Manager (FTPM)\u003c/b\u003e\u003c/p\u003e\u003cp\u003e1) \u0026nbsp; \u0026nbsp; Remove deployed security policy from all devices using FactoryTalk\u00ae Policy Manager (FTPM):\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; Open FTPM.\u003c/p\u003e\u003cp\u003eb. \u0026nbsp; \u0026nbsp; \u0026nbsp; Document all Zone\u2019s security settings and all Conduit\u2019s settings as you must re-create them after updating FTPM.\u003c/p\u003e\u003cp\u003ec. \u0026nbsp; \u0026nbsp; \u0026nbsp; Change all devices port\u2019s Policies \u0026gt; Zone values to the \u201cUnassigned\u201d Zone.\u003c/p\u003e\u003cp\u003ed. \u0026nbsp; \u0026nbsp; \u0026nbsp; Delete all zones and conduits.\u003c/p\u003e\u003cp\u003ee. \u0026nbsp; \u0026nbsp; \u0026nbsp; Deploy (CIP). Ensure that all endpoints were reset successfully.\u003c/p\u003e\u003cp\u003ef. \u0026nbsp; \u0026nbsp; \u0026nbsp; [migrating from v6.40 only] Deploy (OPC UA). Ensure all endpoints were reset successfully.\u003c/p\u003e\u003cp\u003e\u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; \u0026nbsp; i. \u0026nbsp; \u0026nbsp; For any OPC UA clients, perform whatever steps are required by those clients to remove the previously applied certificates.\u003c/p\u003e\u003cp\u003eg. \u0026nbsp; \u0026nbsp; \u0026nbsp; Close FTPM\u003c/p\u003e\u003cp\u003e2) \u0026nbsp; \u0026nbsp; Delete the \\FTSS_backup folder:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell\\RNAServer\\Global\\RnaStore\\FTSS_Backup\u003c/p\u003e\u003cp\u003e3) \u0026nbsp; \u0026nbsp; Delete the \\keystore folder:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\keystore\u003c/p\u003e\u003cp\u003e4) \u0026nbsp; \u0026nbsp; Delete any backup copies of the \\keystore folder. They will be named the same as the \\keystore folder but with a suffix appended to it, like:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ keystore_source_2024_04_25_12_25_38_541566\u003c/p\u003e\u003cp\u003e5) \u0026nbsp; \u0026nbsp; Delete the PSKs.json file:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\PSKs.json\u003c/p\u003e\u003cp\u003e6) \u0026nbsp; \u0026nbsp; Delete any backup copies of the PSKs.json file. They will be named the same as the PSKs.json file but with a suffix appended to it, like:\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ PSKs.json_source_2024_05_17_07_38_25_200356\u003c/p\u003e\u003cp\u003e7) \u0026nbsp; \u0026nbsp; Install FactoryTalk\u00ae Policy Manager version 6.40.01.\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; Restart the computer when prompted at the end of the install.\u003c/p\u003e\u003cp\u003e8) \u0026nbsp; \u0026nbsp; Open FTPM. FTPM will attempt to connect to the FactoryTalk\u00ae System Services web server before proceeding.\u003c/p\u003e\u003cp\u003e9) \u0026nbsp; \u0026nbsp; If FTPM could not successfully connect to FactoryTalk\u00ae System Services (FTSS), it is because the FTSS service hasn\u2019t started yet. It will eventually start or else you can start the FTSS service manually in Windows Services.\u003c/p\u003e\u003cp\u003e10) \u0026nbsp; Re-create the original Zones.\u003c/p\u003e\u003cp\u003e11) \u0026nbsp; Move the devices from the unassigned Zone back to their original zones.\u003c/p\u003e\u003cp\u003e12) \u0026nbsp; Re-create the original Conduits.\u003c/p\u003e\u003cp\u003e13) \u0026nbsp; Deploy (CIP endpoints).\u003c/p\u003e\u003cp\u003e14) \u0026nbsp; [migrating from v6.40 only] Deploy (OPC UA endpoints).\u003c/p\u003e\u003cp\u003ea. \u0026nbsp; \u0026nbsp; \u0026nbsp; For any OPC UA client endpoints, manually apply the newly generated certificates from this deploy.\u003c/p\u003e\u003cp\u003eAdditionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability.\u003c/p\u003e\u003cp\u003e\u00b7 \u0026nbsp; \u0026nbsp; \u0026nbsp; \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\"\u003eSecurity Best Practices\u003c/a\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "Users using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.\n\n Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight" } ], "source": { "advisory": "SD1678", "discovery": "INTERNAL" }, "title": "Rockwell Automation Unsecured Private Keys in FactoryTalk\u00ae System Services", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2024-6326", "datePublished": "2024-07-16T16:51:18.320Z", "dateReserved": "2024-06-25T15:13:43.692Z", "dateUpdated": "2024-08-01T21:33:05.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2637
Vulnerability from cvelistv5
Published
2023-06-13 20:15
Modified
2025-01-02 20:42
Severity ?
EPSS score ?
Summary
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies. Hard-coded cryptographic key may lead to privilege escalation. This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Rockwell Automation | FactoryTalk System Services |
Version: <= 6.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:26:09.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-2637", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:42:16.560791Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:42:32.420Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FactoryTalk System Services", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c= 6.20" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sharon Brizinov of Claroty Research - Team82 " } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRockwell Automation\u0027s FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.\u0026nbsp; Hard-coded cryptographic key may lead to privilege escalation.\u0026nbsp; This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.\u003c/span\u003e\n\n" } ], "value": "\nRockwell Automation\u0027s FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.\u00a0 Hard-coded cryptographic key may lead to privilege escalation.\u00a0 This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.\n\n" } ], "impacts": [ { "capecId": "CAPEC-20", "descriptions": [ { "lang": "en", "value": "CAPEC-20 Encryption Brute Forcing" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321 Use of Hard-Coded Cryptographic Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T20:15:07.735Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCustomers using the affected software are encouraged to apply the risk mitigations, if possible.\u003c/span\u003e\u003cul\u003e\u003cli\u003eUpgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=61050,59723\"\u003e6.30.00\u003c/a\u003e\u0026nbsp;or later which has been patched to mitigate these issues.\u003c/li\u003e\u003c/ul\u003e" } ], "value": "\nCustomers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0or later which has been patched to mitigate these issues.\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation FactoryTalk System Services Vulnerable To Use Of Hard-Coded Cryptographic Key", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-2637", "datePublished": "2023-06-13T20:15:07.735Z", "dateReserved": "2023-05-10T20:31:38.532Z", "dateUpdated": "2025-01-02T20:42:32.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2638
Vulnerability from cvelistv5
Published
2023-06-13 20:25
Modified
2025-01-02 20:45
Severity ?
EPSS score ?
Summary
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.
Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Rockwell Automation | FactoryTalk System Services |
Version: <= 6.20 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:26:09.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-2638", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-02T20:45:37.679849Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-02T20:45:55.640Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FactoryTalk System Services", "vendor": "Rockwell Automation", "versions": [ { "status": "affected", "version": "\u003c= 6.20" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sharon Brizinov of Claroty Research - Team82" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRockwell Automation\u0027s FactoryTalk System Services does not verify that a backup configuration archive is password protected.\n\n\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.\u0026nbsp; This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.\u003c/span\u003e\u003cbr\u003e\n\n\u003c/span\u003e" } ], "value": "\nRockwell Automation\u0027s FactoryTalk System Services does not verify that a backup configuration archive is password protected.\n\n\u00a0\n\nImproper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.\u00a0 This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T20:25:03.375Z", "orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell" }, "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCustomers using the affected software are encouraged to apply the risk mitigations, if possible.\u003c/span\u003e\u003cul\u003e\u003cli\u003eUpgrade to \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx?crumb=113\u0026amp;versions=61050,59723\"\u003e6.30.00\u003c/a\u003e\u0026nbsp;or later which has been patched to mitigate these issues.\u003c/li\u003e\u003c/ul\u003e\n\n\u003cbr\u003e" } ], "value": "\nCustomers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx \u00a0or later which has been patched to mitigate these issues.\n\n\n\n\n\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Rockwell Automation FactoryTalk System Services Vulnerable to a Denial-of-Service Attack", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "assignerShortName": "Rockwell", "cveId": "CVE-2023-2638", "datePublished": "2023-06-13T20:25:03.375Z", "dateReserved": "2023-05-10T20:31:39.989Z", "dateUpdated": "2025-01-02T20:45:55.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-07-16 17:15
Modified
2024-11-21 09:49
Severity ?
Summary
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@rockwellautomation.com | https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.40.0 | |
rockwellautomation | factorytalk_system_services | 6.40.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "299FCB32-7567-4B8C-9F70-EB520975B67E", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_system_services:6.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB55AB67-6380-45A9-8634-175C651AC333", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk\u00ae System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which\u00a0temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network." }, { "lang": "es", "value": "Existe una exposici\u00f3n de vulnerabilidad de informaci\u00f3n confidencial en el servicio del sistema FactoryTalk\u00ae de Rockwell Automation. Un usuario malintencionado podr\u00eda aprovechar esta vulnerabilidad iniciando un proceso de copia de seguridad o restauraci\u00f3n, que expone temporalmente claves privadas, contrase\u00f1as, claves previamente compartidas y carpetas de bases de datos cuando se copian temporalmente en una carpeta provisional. Esta vulnerabilidad se debe a la falta de permisos expl\u00edcitos establecidos en la carpeta de respaldo. Si un usuario malintencionado obtiene claves privadas, podr\u00eda hacerse pasar por recursos en la red segura." } ], "id": "CVE-2024-6326", "lastModified": "2024-11-21T09:49:26.167", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "baseScore": 1.8, "baseSeverity": "LOW", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "recovery": "NOT_DEFINED", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "NONE", "userInteraction": "ACTIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnerabilityResponseEffort": "NOT_DEFINED", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE" }, "source": "PSIRT@rockwellautomation.com", "type": "Secondary" } ] }, "published": "2024-07-16T17:15:12.117", "references": [ { "source": "PSIRT@rockwellautomation.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "sourceIdentifier": "PSIRT@rockwellautomation.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-16 17:15
Modified
2024-11-21 09:49
Severity ?
Summary
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@rockwellautomation.com | https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.40.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.40.0:*:*:*:*:*:*:*", "matchCriteriaId": "299FCB32-7567-4B8C-9F70-EB520975B67E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The v6.40 release of Rockwell Automation FactoryTalk\u00ae Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html \u00a0and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html \u00a0by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html \u00a0and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html" }, { "lang": "es", "value": "La versi\u00f3n v6.40 de Rockwell Automation FactoryTalk\u00ae Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html y CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html implementando seguridad CIP y no actualiz\u00f3 a las versiones del software CVE-2022-1161 https:// www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html y CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html" } ], "id": "CVE-2024-6325", "lastModified": "2024-11-21T09:49:26.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "automatable": "NOT_DEFINED", "availabilityRequirements": "NOT_DEFINED", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "recovery": "NOT_DEFINED", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnerabilityResponseEffort": "NOT_DEFINED", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE" }, "source": "PSIRT@rockwellautomation.com", "type": "Secondary" } ] }, "published": "2024-07-16T17:15:11.947", "references": [ { "source": "PSIRT@rockwellautomation.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html" } ], "sourceIdentifier": "PSIRT@rockwellautomation.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-13 21:15
Modified
2024-11-21 07:58
Severity ?
4.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
4.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Summary
The underlying feedback mechanism of
Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device. This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@rockwellautomation.com | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.11.0 | |
rockwellautomation | factorytalk_system_services | 6.11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "78D6F03E-E110-4CA7-8883-5CE38FF8E5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_system_services:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "46A50229-56B5-4B30-8B4A-6D180D65C2D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The underlying feedback mechanism of \n\nRockwell Automation\u0027s\u00a0FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.\u00a0 This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.\u00a0\n\n\n" } ], "id": "CVE-2023-2639", "lastModified": "2024-11-21T07:58:58.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T21:15:10.043", "references": [ { "source": "PSIRT@rockwellautomation.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "sourceIdentifier": "PSIRT@rockwellautomation.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-13 21:15
Modified
2024-11-21 07:58
Severity ?
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Summary
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies. Hard-coded cryptographic key may lead to privilege escalation. This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@rockwellautomation.com | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.11.0 | |
rockwellautomation | factorytalk_system_services | 6.11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "78D6F03E-E110-4CA7-8883-5CE38FF8E5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_system_services:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "46A50229-56B5-4B30-8B4A-6D180D65C2D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nRockwell Automation\u0027s FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.\u00a0 Hard-coded cryptographic key may lead to privilege escalation.\u00a0 This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.\n\n" } ], "id": "CVE-2023-2637", "lastModified": "2024-11-21T07:58:58.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 5.3, "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T21:15:09.917", "references": [ { "source": "PSIRT@rockwellautomation.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "sourceIdentifier": "PSIRT@rockwellautomation.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-13 21:15
Modified
2024-11-21 07:58
Severity ?
5.9 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
5.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
5.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
Summary
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.
Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
References
▼ | URL | Tags | |
---|---|---|---|
PSIRT@rockwellautomation.com | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | Permissions Required, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rockwellautomation | factorytalk_policy_manager | 6.11.0 | |
rockwellautomation | factorytalk_system_services | 6.11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "78D6F03E-E110-4CA7-8883-5CE38FF8E5A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_system_services:6.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "46A50229-56B5-4B30-8B4A-6D180D65C2D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nRockwell Automation\u0027s FactoryTalk System Services does not verify that a backup configuration archive is password protected.\n\n\u00a0\n\nImproper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.\u00a0 This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.\n\n\n" } ], "id": "CVE-2023-2638", "lastModified": "2024-11-21T07:58:58.830", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-13T21:15:09.983", "references": [ { "source": "PSIRT@rockwellautomation.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683" } ], "sourceIdentifier": "PSIRT@rockwellautomation.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "PSIRT@rockwellautomation.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }