Rockwell Automation’s ThinManager ThinServer has been found to contain multiple critical vulnerabilities that could allow attackers to execute remote code.
Nicholas Zubrisky of Trend Micro Security Research discovered the flaws, identified as CVE-2024-7986, CVE-2024-7987, and CVE-2024-7988, and published a detailed advisory.
The vulnerabilities affect several versions of ThinManager ThinServer, a widely used platform for centralized management of thin client networks.
The flaws have been assigned CVSS scores ranging from 5.5 to 9.8, indicating varying levels of severity.
Table: Affected Products and Solutions
Affected Product | First Known Version | Corrected Version |
ThinManager® ThinServer™ | 11.1.0-11.1.7 | 11.1.8 |
11.2.0-11.2.8 | 11.2.9 | |
12.0.0-12.0.6 | 12.0.7 | |
12.1.0-12.1.7 | 12.1.8 | |
13.0.0-13.0.4 | 13.0.5 | |
13.1.0-13.1.2 | 13.1.3 | |
13.2.0-13.2.1 | 13.2.2 |
CVE-2024-7986: Information Disclosure
This vulnerability allows attackers to disclose sensitive information by exploiting the ThinServer service.
Threat actors can read arbitrary files by creating a junction that points to a target directory. The flaw is rated with a CVSS score of 5.5 (v3.1) and 6.8 (v4.0), indicating a moderate risk. The vulnerability is linked to CWE-269, which involves improper privilege management.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial
CVE-2024-7987: Remote Code Execution
CVE-2024-7987 is a more severe flaw, enabling attackers to execute arbitrary code with system privileges.
By abusing the ThinServer service, attackers can upload arbitrary files, potentially compromising entire systems.
This vulnerability has a CVSS score of 7.8 (v3.1) and 8.5 (v4.0), highlighting its critical nature.
CVE-2024-7988: Critical Remote Code Execution
The most critical of the three, CVE-2024-7988, allows for remote code execution due to improper input validation.
This flaw can lead to file overwriting, posing a significant threat to system integrity. It has been assigned a CVSS score of 9.8 (v3.1) and 9.3 (v4.0).
Rockwell Automation has urged users to update the corrected software versions in the table above.
Implementing security best practices and staying informed about potential threats are also recommended to minimize risk.
The company emphasizes the importance of stakeholder-specific vulnerability categorization to prioritize security efforts effectively.
These vulnerabilities pose serious risks to industrial systems, so immediate action is advised to protect sensitive data and maintain operational integrity.
Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…