Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Rockwell Automation ThinManager ThinServer Multiple Vulnerabilities

Critical

Synopsis

CVE-2024-5988 - Message Type 20 Unauthenticated Remote Code Execution (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

An unauthenticated remote attacker can send a specifically crafted synchronization message of type 20 to execute a Tcl command, which can invoke a local or remote executable under the security context of SYSTEM.


CVE-2024-5989 - Message Type 11 Unauthenticated Database Manipulation (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

An unauthenticated remote attacker can send a specifically crafted synchronization message of type 11 to issue SQL statements to the ThinManager database. For example, the attacker can enable HTTP API and add an API key to the ApiKeys table in the database so that he or she can access protected API URL endpoints.


CVE-2024-5990 - Incomplete fix for CVE-2023-2914

ThinServer.exe v13.1.1.9 addressed the issue by preventing a bad size in many caller functions from being passed to the vulnerable "GetDataFromMsgBody" function. This mitigation, however, is missing in some caller functions. An unauthenticated remote attacker can still exploit the vulnerability by sending crafted messages to a monitor thread within ThinServer.exe.


Note: Certain information regarding proof-of-concepts in this advisory has been redacted at the request of the vendor. Despite this, Tenable maintains a stance in favor of open access to exploit details and vulnerability-related information, as we believe transparent and open discussion in these matters contribute significantly to enhancing the security of our customers and the community at large.
 

Solution

Apply the relevant vendor-supplied patches found here: https://thinmanager.com/downloads/index.php

Disclosure Timeline

January 22, 2024 - Tenable discloses issues to Rockwell. Rockwell acknowledges.
January 25, 2024 - Rockwell requests retransmission of PoCs. Tenable sends PoCs again.
February 1, 2024 - Rockwell requests retransmission of PoCs. Tenable sends PoCs again.
February 2, 2024 - Tenable requests acknowledgement that PoCs have been received.
February 2-9, 2024 - Back and forth getting PoCs properly transmitted.
February 21, 2024 - Tenable requests status update.
February 29, 2024 - Rockwell provides status update.
March 4, 2024 - Tenable acknowledges and provides advisory draft.
April 5, 2024 - Tenable requests status update.
April 8, 2024 - Rockwell requests extension to May 30. Tenable agrees.
May 22, 2024 - Tenable sends disclosure date reminder.
May 28, 2024 - Tenable sends disclosure date reminder and requests CVE information from Rockwell.
May 28, 2024 - Rockwell provides status update and requests extension to June 30.
May 29, 2024 - Tenable suggests an extension to June 17 instead.
May 29, 2024 - Rockwell agrees to June 17 extension.
June 11, 2024 - Tenable checks in with Rockwell.
June 12, 2024 - Rockwell states that the release should be on track.
June 17, 2024 - Tenable request link to advisory and CVE identifiers from Rockwell.
June 17, 2024 - Rockwell requests we hold our advisory for unspecified amount of time and will send us an update by EOD.
June 17, 2024 - Tenable acknowledges.
June 17, 2024 - Rockwell provides status update with intended release date of June 25, 2024.
June 18, 2024 - Tenable acknowledges, states intent to publish on June 25 regardless of patching status and requests information regarding CVE identifiers and fixed versions.
June 20, 2024 - Rockwell provides Tenable with advisory preview.
June 24, 2024 - Tenable provides Rockwell with updated advisory draft.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2024-24
Affected Products:
Affected Products: Rockwell Automation ThinManager ThinServer.exe prior to 11.1.8, 11.2.9, 12.0.7, 12.1.8, 13.0.5, 13.1.3, 13.2.2
Risk Factor:
Critical

Advisory Timeline

June 25, 2024 - Initial release.