An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-34359 | An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables. |
Fixes
Solution
* Update to the corrected software versions
Workaround
No workaround given by the vendor.
References
History
Wed, 05 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Rockwell
Published:
Updated: 2025-03-05T18:48:42.077Z
Reserved: 2023-05-26T13:21:35.457Z
Link: CVE-2023-2913

Updated: 2024-08-02T06:41:03.654Z

Status : Modified
Published: 2023-07-18T20:15:09.667
Modified: 2024-11-21T07:59:33.450
Link: CVE-2023-2913

No data.

No data.