{ "id": "CVE-2023-46290", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-10-27T19:15:41.560", "lastModified": "2024-11-21T08:28:14.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDue to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk\u00ae Services Platform web service and then use the token to log in into FactoryTalk\u00ae Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk\u00ae Services Platform web service.\n\n" }, { "lang": "es", "value": "Debido a una l\u00f3gica de c\u00f3digo inadecuada, un actor de amenazas no autenticado previamente podr\u00eda obtener un token de usuario del sistema operativo Windows local a trav\u00e9s del servicio web FactoryTalk\u00ae Services Platform y luego usar el token para iniciar sesi\u00f3n en FactoryTalk\u00ae Services Platform. Esta vulnerabilidad solo se puede aprovechar si el usuario autorizado no inici\u00f3 sesi\u00f3n previamente en el servicio web FactoryTalk\u00ae Services Platform." } ], "metrics": { "cvssMetricV31": [ { "source": "PSIRT@rockwellautomation.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.1, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "PSIRT@rockwellautomation.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:rockwellautomation:factorytalk_services_platform:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.80", "matchCriteriaId": "86F8AE4A-2067-4989-BED5-B4CB8A03E8BB" } ] } ] } ], "references": [ { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141165", "source": "PSIRT@rockwellautomation.com", "tags": [ "Permissions Required", "Vendor Advisory" ] }, { "url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141165", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ] } ] }