TCP: Rockwell Automation ThinManager Directory Traversal
This signature detects attempts to exploit a known vulnerability against ockwell Automation ThinManager. A successful attack can lead to directory traversal and arbitrary code execution.
Extended Description
In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.
Affected Products
Rockwellautomation thinmanager
References
CVE: CVE-2023-2915
URL: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640 https://www.tenable.com/security/research/tra-2023-13 https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-06 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 https://www.tenable.com/security/research/tra-2023-28
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Rockwellautomation