Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.
Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
Project Subscriptions
No advisories yet.
Solution
Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx or later which has been patched to mitigate these issues.
Workaround
No workaround given by the vendor.
Thu, 02 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2025-01-02T20:45:55.640Z
Reserved: 2023-05-10T20:31:39.989Z
Link: CVE-2023-2638
Updated: 2024-08-02T06:26:09.833Z
Status : Modified
Published: 2023-06-13T21:15:09.983
Modified: 2024-11-21T07:58:58.830
Link: CVE-2023-2638
No data.
OpenCVE Enrichment
No data.