{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-10387", "ASSIGNER": "PSIRT@rockwellautomation.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "CVE-2024-10387 IMPACT\n\n\n\nA Denial-of-Service\nvulnerability exists in the affected product. The vulnerability could allow a\nthreat actor with network access to send crafted messages to the device,\npotentially resulting in Denial-of-Service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125 Out-of-bounds Read", "cweId": "CWE-125" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Rockwell Automation", "product": { "product_data": [ { "product_name": "FactoryTalk ThinManager", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.2.0-11.2.9" }, { "version_affected": "=", "version_value": "12.0.0-12.0.7" }, { "version_affected": "=", "version_value": "12.1.0-12.1.8" }, { "version_affected": "=", "version_value": "13.0.0-13.0.5" }, { "version_affected": "=", "version_value": "13.1.0-13.1.3" }, { "version_affected": "=", "version_value": "13.2.0-13.2.2" }, { "version_affected": "=", "version_value": "14.0.0" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html", "refsource": "MISC", "name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html" } ] }, "generator": { "engine": "Vulnogram 0.2.0" }, "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "
If able,\nnavigate to the ThinManager\u00ae download site and upgrade to a corrected version of ThinManager\u00ae
Implement\nnetwork hardening for ThinManager\u00ae Device(s) by limiting communications to TCP\n2031 to only the devices that need connection to the ThinManager\u00ae
\n\n\n\nFor\ninformation on how to mitigate Security Risks on industrial automation control\nsystems, we encourage customers to implement our suggested security best\npractices to\nminimize the risk of the vulnerability.
" } ], "value": "If able,\nnavigate to the ThinManager\u00ae download site https://thinmanager.com/downloads/ and upgrade to a corrected version of ThinManager\u00ae\n\nImplement\nnetwork hardening for ThinManager\u00ae Device(s) by limiting communications to TCP\n2031 to only the devices that need connection to the ThinManager\u00ae\n\n\n\n\n\nFor\ninformation on how to mitigate Security Risks on industrial automation control\nsystems, we encourage customers to implement our suggested security best\npractices to\nminimize the risk of the vulnerability." } ], "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "If able,\nnavigate to the ThinManager\u00ae download site and upgrade to a corrected version of ThinManager\u00ae\n\n11.2.10
\n
12.0.8
\n
12.1.9
\n
13.0.6
\n\n\n\n13.1.4
\n\n\n\n13.2.3
\n\n\n\n14.0.1
\n\n\n\n\n\n\n\n