cvelist/2024/6xxx/CVE-2024-6326.json
2024-07-16 17:00:34 +00:00

95 lines
8.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-6326",
"ASSIGNER": "PSIRT@rockwellautomation.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk\u00ae System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which\u00a0temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-269 Improper Privilege Management",
"cweId": "CWE-269"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Rockwell Automation",
"product": {
"product_data": [
{
"product_name": "FactoryTalk\u00ae System Services (installed via FTPM)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v6.40"
}
]
}
},
{
"product_name": "FactoryTalk\u00ae Policy Manager (FTPM)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "v6.40"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html",
"refsource": "MISC",
"name": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1678.html"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"advisory": "SD1678",
"discovery": "INTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<p>Users using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.</p><p><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\">\u00b7 &nbsp; &nbsp; &nbsp; Clear CIP Security configurations from devices and from FactoryTalk\u00ae Policy Manager</a></p><p>\u00b7 &nbsp; &nbsp; &nbsp; Update FactoryTalk\u00ae System Services and FactoryTalk\u00ae Policy Manager to v6.40.01</p><p>\u00b7 &nbsp; &nbsp; &nbsp; Redeploy CIP Security Policy </p><p>Detailed steps are below <b>(FactoryTalk System Services (FTSS) is updated through the installation of FactoryTalk Policy Manager (FTPM)</b></p><p>1) &nbsp; &nbsp; Remove deployed security policy from all devices using FactoryTalk\u00ae Policy Manager (FTPM):</p><p>a. &nbsp; &nbsp; &nbsp; Open FTPM.</p><p>b. &nbsp; &nbsp; &nbsp; Document all Zone\u2019s security settings and all Conduit\u2019s settings as you must re-create them after updating FTPM.</p><p>c. &nbsp; &nbsp; &nbsp; Change all devices port\u2019s Policies &gt; Zone values to the \u201cUnassigned\u201d Zone.</p><p>d. &nbsp; &nbsp; &nbsp; Delete all zones and conduits.</p><p>e. &nbsp; &nbsp; &nbsp; Deploy (CIP). Ensure that all endpoints were reset successfully.</p><p>f. &nbsp; &nbsp; &nbsp; [migrating from v6.40 only] Deploy (OPC UA). Ensure all endpoints were reset successfully.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; i. &nbsp; &nbsp; For any OPC UA clients, perform whatever steps are required by those clients to remove the previously applied certificates.</p><p>g. &nbsp; &nbsp; &nbsp; Close FTPM</p><p>2) &nbsp; &nbsp; Delete the \\FTSS_backup folder:</p><p>a. &nbsp; &nbsp; &nbsp; c:\\ProgramData\\Rockwell\\RNAServer\\Global\\RnaStore\\FTSS_Backup</p><p>3) &nbsp; &nbsp; Delete the \\keystore folder:</p><p>a. &nbsp; &nbsp; &nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\keystore</p><p>4) &nbsp; &nbsp; Delete any backup copies of the \\keystore folder. They will be named the same as the \\keystore folder but with a suffix appended to it, like:</p><p>a. &nbsp; &nbsp; &nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ keystore_source_2024_04_25_12_25_38_541566</p><p>5) &nbsp; &nbsp; Delete the PSKs.json file:</p><p>a. &nbsp; &nbsp; &nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\PSKs.json</p><p>6) &nbsp; &nbsp; Delete any backup copies of the PSKs.json file. They will be named the same as the PSKs.json file but with a suffix appended to it, like:</p><p>a. &nbsp; &nbsp; &nbsp; c:\\ProgramData\\Rockwell Automation\\FactoryTalk System Services\\ PSKs.json_source_2024_05_17_07_38_25_200356</p><p>7) &nbsp; &nbsp; Install FactoryTalk\u00ae Policy Manager version 6.40.01.</p><p>a. &nbsp; &nbsp; &nbsp; Restart the computer when prompted at the end of the install.</p><p>8) &nbsp; &nbsp; Open FTPM. FTPM will attempt to connect to the FactoryTalk\u00ae System Services web server before proceeding.</p><p>9) &nbsp; &nbsp; If FTPM could not successfully connect to FactoryTalk\u00ae System Services (FTSS), it is because the FTSS service hasn\u2019t started yet. It will eventually start or else you can start the FTSS service manually in Windows Services.</p><p>10) &nbsp; Re-create the original Zones.</p><p>11) &nbsp; Move the devices from the unassigned Zone back to their original zones.</p><p>12) &nbsp; Re-create the original Conduits.</p><p>13) &nbsp; Deploy (CIP endpoints).</p><p>14) &nbsp; [migrating from v6.40 only] Deploy (OPC UA endpoints).</p><p>a. &nbsp; &nbsp; &nbsp; For any OPC UA client endpoints, manually apply the newly generated certificates from this deploy.</p><p>Additionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability.</p><p>\u00b7 &nbsp; &nbsp; &nbsp; <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">Security Best Practices</a></p>\n\n<br>"
}
],
"value": "Users using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones.\n\n Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
}
]
}