ID

VAR-202408-2396


CVE

CVE-2024-7986


TITLE

Rockwell Automation ThinManager ThinServer Arbitrary File Read Information Disclosure Vulnerability

Trust: 0.7

sources: ZDI: ZDI-24-1156

DESCRIPTION

A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the ThinServer service which listens on TCP port 8443 by default. The issue results from the lack of proper access controls set on resources used by the service. An attacker can leverage this vulnerability to read files in the context of the SYSTEM. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA

Trust: 2.07

sources: NVD: CVE-2024-7986 // ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-46733

AFFECTED PRODUCTS

vendor:rockwell automationmodel:thinmanagerscope: - version: -

Trust: 0.7

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:1.1.0,<=11.1.7

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:11.2.0,<=11.2.8

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:12.0.0,<=12.0.6

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:12.1.0,<=12.1.7

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.0.0,<=13.0.4

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.1.0,<=13.1.2

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.2.0,<=13.2.1

Trust: 0.6

sources: ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733

CVSS

SEVERITY

CVSSV2

CVSSV3

PSIRT@rockwellautomation.com: CVE-2024-7986
value: MEDIUM

Trust: 1.0

ZDI: CVE-2024-7986
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2024-46733
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2024-46733
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:S/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.1
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

ZDI: CVE-2024-7986
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733 // NVD: CVE-2024-7986

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.0

sources: NVD: CVE-2024-7986

PATCH

title:Rockwell Automation has issued an update to correct this vulnerability.url:https://www.rockwellautomation.com/en-ca/trust-center/security-advisories/advisory.SD1692.html

Trust: 0.7

title:Patch for Rockwell Automation ThinManager ThinServer Permission Management Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/634621

Trust: 0.6

sources: ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733

EXTERNAL IDS

db:NVDid:CVE-2024-7986

Trust: 2.3

db:ZDIid:ZDI-24-1156

Trust: 1.3

db:ZDI_CANid:ZDI-CAN-24002

Trust: 0.7

db:CNVDid:CNVD-2024-46733

Trust: 0.6

sources: ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733 // NVD: CVE-2024-7986

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1692.html

Trust: 1.0

url:https://www.rockwellautomation.com/en-ca/trust-center/security-advisories/advisory.sd1692.html

Trust: 0.7

url:https://www.zerodayinitiative.com/advisories/zdi-24-1156/

Trust: 0.6

sources: ZDI: ZDI-24-1156 // CNVD: CNVD-2024-46733 // NVD: CVE-2024-7986

CREDITS

Nicholas Zubrisky (@NZubrisky) of Trend Micro Security Research

Trust: 0.7

sources: ZDI: ZDI-24-1156

SOURCES

db:ZDIid:ZDI-24-1156
db:CNVDid:CNVD-2024-46733
db:NVDid:CVE-2024-7986

LAST UPDATE DATE

2024-12-21T23:17:30.960000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-1156date:2024-08-22T00:00:00
db:CNVDid:CNVD-2024-46733date:2024-12-02T00:00:00
db:NVDid:CVE-2024-7986date:2024-08-23T16:18:28.547

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-1156date:2024-08-22T00:00:00
db:CNVDid:CNVD-2024-46733date:2024-12-02T00:00:00
db:NVDid:CVE-2024-7986date:2024-08-23T12:15:03.920