Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.
Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Customers using the affected software are encouraged to apply the risk mitigations, if possible. * Upgrade to 6.30.00 https://compatibility.rockwellautomation.com/Pages/MultiProductCompareSelections.aspx or later which has been patched to mitigate these issues.
Workaround
No workaround given by the vendor.
Thu, 02 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2025-01-02T20:45:55.640Z
Reserved: 2023-05-10T20:31:39.989Z
Link: CVE-2023-2638
Updated: 2024-08-02T06:26:09.833Z
Status : Modified
Published: 2023-06-13T21:15:09.983
Modified: 2024-11-21T07:58:58.830
Link: CVE-2023-2638
No data.
OpenCVE Enrichment
No data.