Page 6 of 241 results (0.003 seconds)

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 0

Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint. This vulnerability can be exploited in two ways. If an attacker sends a malicious link to a computer that is on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link, the attacker could impersonate the legitimate user and send requests to the affected product.  Additionally, if an attacker sends an untrusted link to a computer that is not on the same domain as the server and a user opens the FactoryTalk Vantagepoint website, enters credentials for the FactoryTalk Vantagepoint server, and clicks on the malicious link a cross site request forgery attack would be successful as well. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139443 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139442 • CWE-326: Inadequate Encryption Strength •

CVSS: 9.4EPSS: 0%CPEs: 2EXPL: 0

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441 https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-09 • CWE-284: Improper Access Control •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •