TCP: Rockwell Automation ThinManager Directory Traversal

This signature detects attempts to exploit a known vulnerability against ockwell Automation ThinManager. A successful attack can lead to directory traversal and arbitrary code execution.

Extended Description

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

Affected Products

Rockwellautomation thinmanager

Short Name
TCP:C2S:ROCKWELL-DIR-TRSV
Severity
Major
Recommended
False
Recommended Action
None
Category
TCP
Keywords
Automation CVE-2023-27855 CVE-2023-2915 Directory Rockwell ThinManager Traversal
Release Date
05/04/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3650
Port
TCP/2031
False Positive
Rarely
Vendors

Rockwellautomation

Found a potential security threat?