ID

VAR-202408-2442


CVE

CVE-2024-7988


TITLE

Rockwell Automation ThinManager ThinServer Unrestricted File Upload Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-24-1158

DESCRIPTION

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ThinServer service. Rockwell Automation ThinManager is a thin client management software from Rockwell Automation, USA

Trust: 2.07

sources: NVD: CVE-2024-7988 // ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-46735

AFFECTED PRODUCTS

vendor:rockwell automationmodel:thinmanagerscope: - version: -

Trust: 0.7

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:1.1.0,<=11.1.7

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:11.2.0,<=11.2.8

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:12.0.0,<=12.0.6

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:12.1.0,<=12.1.7

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.0.0,<=13.0.4

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.1.0,<=13.1.2

Trust: 0.6

vendor:rockwellmodel:automation thinmanager thinserverscope:gteversion:13.2.0,<=13.2.1

Trust: 0.6

sources: ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-7988
value: CRITICAL

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2024-7988
value: CRITICAL

Trust: 1.0

ZDI: CVE-2024-7988
value: CRITICAL

Trust: 0.7

CNVD: CNVD-2024-46735
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-46735
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-7988
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2024-7988
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735 // NVD: CVE-2024-7988 // NVD: CVE-2024-7988

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2024-7988

PATCH

title:Rockwell Automation has issued an update to correct this vulnerability.url:https://www.rockwellautomation.com/en-ca/trust-center/security-advisories/advisory.SD1692.html

Trust: 0.7

title:Patch for Rockwell Automation ThinManager ThinServer Remote Code Execution Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/634606

Trust: 0.6

sources: ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735

EXTERNAL IDS

db:NVDid:CVE-2024-7988

Trust: 2.3

db:ZDIid:ZDI-24-1158

Trust: 1.3

db:ZDI_CANid:ZDI-CAN-24040

Trust: 0.7

db:CNVDid:CNVD-2024-46735

Trust: 0.6

sources: ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735 // NVD: CVE-2024-7988

REFERENCES

url:https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.sd1692.html

Trust: 1.0

url:https://www.rockwellautomation.com/en-ca/trust-center/security-advisories/advisory.sd1692.html

Trust: 0.7

url:https://www.zerodayinitiative.com/advisories/zdi-24-1158/

Trust: 0.6

sources: ZDI: ZDI-24-1158 // CNVD: CNVD-2024-46735 // NVD: CVE-2024-7988

CREDITS

Nicholas Zubrisky (@NZubrisky) of Trend Micro Security Research

Trust: 0.7

sources: ZDI: ZDI-24-1158

SOURCES

db:ZDIid:ZDI-24-1158
db:CNVDid:CNVD-2024-46735
db:NVDid:CVE-2024-7988

LAST UPDATE DATE

2024-12-21T23:16:48.783000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-24-1158date:2024-08-22T00:00:00
db:CNVDid:CNVD-2024-46735date:2024-12-02T00:00:00
db:NVDid:CVE-2024-7988date:2024-08-26T18:35:14.617

SOURCES RELEASE DATE

db:ZDIid:ZDI-24-1158date:2024-08-22T00:00:00
db:CNVDid:CNVD-2024-46735date:2024-12-02T00:00:00
db:NVDid:CVE-2024-7988date:2024-08-26T15:15:09.140