Description
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.
Published: 2023-08-17
Score: 7.5 High
EPSS: 24.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

* Update to the corrected software versions. * Limit remote access for TCP Port 2031 to known thin clients and ThinManager servers.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 08 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation Thinmanager Thinserver
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-10-08T17:08:30.894Z

Reserved: 2023-05-26T13:23:41.377Z

Link: CVE-2023-2914

cve-icon Vulnrichment

Updated: 2024-08-02T06:41:03.723Z

cve-icon NVD

Status : Modified

Published: 2023-08-17T16:15:09.513

Modified: 2024-11-21T07:59:33.587

Link: CVE-2023-2914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses