An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rockwellautomation
Rockwellautomation factorytalk Policy Manager Rockwellautomation factorytalk System Services |
|
Weaknesses | CWE-276 | |
CPEs | cpe:2.3:a:rockwellautomation:factorytalk_policy_manager:6.40.0:*:*:*:*:*:*:* cpe:2.3:a:rockwellautomation:factorytalk_system_services:6.40.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Rockwellautomation
Rockwellautomation factorytalk Policy Manager Rockwellautomation factorytalk System Services |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Rockwell
Published: 2024-07-16T16:51:18.320Z
Updated: 2024-08-01T21:33:05.450Z
Reserved: 2024-06-25T15:13:43.692Z
Link: CVE-2024-6326
Vulnrichment
Updated: 2024-08-01T21:33:05.450Z
NVD
Status : Modified
Published: 2024-07-16T17:15:12.117
Modified: 2024-11-21T09:49:26.167
Link: CVE-2024-6326
Redhat
No data.