Description
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition.
Published: 2023-08-17
Score: 7.5 High
EPSS: 9.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

* Update to the corrected software versions. * Limit remote access for TCP Port 2031 to known thin clients and ThinManager servers.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.1179}

epss

{'score': 0.13436}


Tue, 08 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Rockwellautomation Thinmanager Thinserver
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-10-08T17:01:54.549Z

Reserved: 2023-05-26T13:45:57.862Z

Link: CVE-2023-2915

cve-icon Vulnrichment

Updated: 2024-08-02T06:41:03.650Z

cve-icon NVD

Status : Modified

Published: 2023-08-17T16:15:09.693

Modified: 2024-11-21T07:59:33.727

Link: CVE-2023-2915

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses