{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-5988", "ASSIGNER": "PSIRT@rockwellautomation.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation\u00a0ThinManager\u00ae ThinServer\u2122." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation", "cweId": "CWE-20" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Rockwell Automation", "product": { "product_data": [ { "product_name": "ThinManager\u00ae ThinServer\u2122", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.1.0" }, { "version_affected": "=", "version_value": "11.2.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "12.1.0" }, { "version_affected": "=", "version_value": "13.0.0" }, { "version_affected": "=", "version_value": "13.1.0" }, { "version_affected": "=", "version_value": "13.2.0" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html", "refsource": "MISC", "name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "discovery": "EXTERNAL" }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "

Affected Product

CVE

First Known in software version

Corrected in software version (Available Here)

ThinManager\u00ae ThinServer\u2122

2024-5988

2024-5989

 

 

 

 

 

11.1.0

11.2.0

12.0.0

12.1.0

13.0.0

13.1.0

13.2.0

11.1.8

11.2.9

12.0.7

12.1.8

13.0.5

13.1.3

13.2.2

2024-5990

11.1.0

11.2.0

12.0.0

12.1.0

13.0.0

13.1.0

11.1.8

11.2.9

12.0.7

12.1.8

13.0.4

13.1.2

\n\n
\n\n

Customers using the affected software are encouraged to apply the risk mitigations from the list below, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the potential risk of vulnerability.

\u00b7 Update to the corrected software versions via the ThinManager\u00ae Downloads Site

\u00b7 Limit remote access for TCP Port 2031 to known thin clients and ThinManager\u00ae servers.

\u00b7 Security Best Practices

 

\n\n
" } ], "value": "Affected Product\n\nCVE\n\nFirst Known in software version\n\nCorrected in software version ( Available Here https://thinmanager.com/downloads/index.php )\n\nThinManager\u00ae ThinServer\u2122\n\n2024-5988\n\n2024-5989\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n\u00a0\n\n11.1.0\n\n11.2.0\n\n12.0.0\n\n12.1.0\n\n13.0.0\n\n13.1.0\n\n13.2.0\n\n 11.1.8 https://thinmanager.com/downloads/index.php \n\n 11.2.9 https://thinmanager.com/downloads/index.php \n\n 12.0.7 https://thinmanager.com/downloads/index.php \n\n 12.1.8 https://thinmanager.com/downloads/index.php \n\n 13.0.5 https://thinmanager.com/downloads/index.php \n\n 13.1.3 https://thinmanager.com/downloads/index.php \n\n 13.2.2 https://thinmanager.com/downloads/index.php \n\n2024-5990\n\n11.1.0\n\n11.2.0\n\n12.0.0\n\n12.1.0\n\n13.0.0\n\n13.1.0\n\n 11.1.8 https://thinmanager.com/downloads/index.php \n\n 11.2.9 https://thinmanager.com/downloads/index.php \n\n 12.0.7 https://thinmanager.com/downloads/index.php \n\n 12.1.8 https://thinmanager.com/downloads/index.php \n\n 13.0.4 https://thinmanager.com/downloads/index.php \n\n 13.1.2 https://thinmanager.com/downloads/index.php \n\n\n\n\n\n\nCustomers using the affected software are encouraged to apply the risk mitigations from the list below, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the potential risk of vulnerability.\n\n\u00b7 Update to the corrected software versions via the ThinManager\u00ae Downloads Site https://thinmanager.com/downloads/index.php \n\n\u00b7 Limit remote access for TCP Port 2031 to known thin clients and ThinManager\u00ae servers.\n\n\u00b7 Security \u00a0Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight" } ] }