Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-34103 Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.
Fixes

Solution

Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx  or later which has been patched to mitigate these issues.


Workaround

No workaround given by the vendor.

History

Thu, 02 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-01-02T20:42:32.420Z

Reserved: 2023-05-10T20:31:38.532Z

Link: CVE-2023-2637

cve-icon Vulnrichment

Updated: 2024-08-02T06:26:09.908Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T21:15:09.917

Modified: 2024-11-21T07:58:58.717

Link: CVE-2023-2637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.