Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.

 

Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.


Advisories

No advisories yet.

Fixes

Solution

Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx  or later which has been patched to mitigate these issues.


Workaround

No workaround given by the vendor.

History

Thu, 02 Jan 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-01-02T20:45:55.640Z

Reserved: 2023-05-10T20:31:39.989Z

Link: CVE-2023-2638

cve-icon Vulnrichment

Updated: 2024-08-02T06:26:09.833Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T21:15:09.983

Modified: 2024-11-21T07:58:58.830

Link: CVE-2023-2638

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.