Description
CVE-2024-45826 IMPACT
Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file.
Published: 2024-09-12
Score: 8.5 High
EPSS: 3.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Upgrade to V13.1.3 or V13.2.2

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-41620 CVE-2024-45826 IMPACT Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file.
History

Thu, 12 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation thinmanager
CPEs cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*
Vendors & Products Rockwellautomation
Rockwellautomation thinmanager
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Sep 2024 14:45:00 +0000

Type Values Removed Values Added
Description CVE-2024-45826 IMPACT Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file.
Title ThinManager® Code Execution Vulnerability
Weaknesses CWE-610
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Rockwellautomation Thinmanager
cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2024-09-12T14:58:34.096Z

Reserved: 2024-09-09T19:33:02.444Z

Link: CVE-2024-45826

cve-icon Vulnrichment

Updated: 2024-09-12T14:58:28.877Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-12T15:18:24.287

Modified: 2024-10-02T14:35:38.017

Link: CVE-2024-45826

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses