8 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication. Existe una vulnerabilidad en Rockwell Automation FactoryTalk® Service Platform que permite a un usuario malintencionado obtener el token de servicio y usarlo para autenticación en otro directorio FTSP. Esto se debe a la falta de firma digital entre el token del servicio FTSP y el directorio. • https://www.rockwellautomation.com/en-us/support/advisory.SD1660.html • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Due to inadequate code logic, a previously unauthenticated threat actor could potentially obtain a local Windows OS user token through the FactoryTalk® Services Platform web service and then use the token to log in into FactoryTalk® Services Platform . This vulnerability can only be exploited if the authorized user did not previously log in into the FactoryTalk® Services Platform web service. Debido a una lógica de código inadecuada, un actor de amenazas no autenticado previamente podría obtener un token de usuario del sistema operativo Windows local a través del servicio web FactoryTalk® Services Platform y luego usar el token para iniciar sesión en FactoryTalk® Services Platform. Esta vulnerabilidad solo se puede aprovechar si el usuario autorizado no inició sesión previamente en el servicio web FactoryTalk® Services Platform. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1141165 • CWE-287: Improper Authentication •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine. Rockwell Automation FactoryTalk Services Platform versiones v6.11 y anteriores, si FactoryTalk Security está habilitado e implementado, contiene una vulnerabilidad que puede permitir a un atacante remoto y autenticado omitir las políticas de FactoryTalk Security basadas en el nombre del equipo. Si es explotado con éxito, esto puede permitir a un atacante tener los mismos privilegios que si estuviera conectado a la máquina cliente • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 • CWE-863: Incorrect Authorization •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

A local, authenticated attacker could use an XML External Entity (XXE) attack to exploit weakly configured XML files to access local or remote content. A successful exploit could potentially cause a denial-of-service condition and allow the attacker to arbitrarily read any local file via system-level services. Un atacante local y autenticado podría usar un ataque de tipo XML External Entity (XXE) para explotar archivos XML débilmente configurados para acceder a contenido local o remoto. Un ataque exitoso podría causar una condición de denegación de servicio y permitir al atacante leer arbitrariamente cualquier archivo local por medio de servicios a nivel de sistema • https://www.cisa.gov/uscert/ics/advisories/icsa-20-177-02 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly. En Rockwell Automation FactoryTalk Services Platform versiones 6.10.00 y 6.11.00, se presenta un problema con la implementación del algoritmo de hash SHA-256 con la plataforma de servicios FactoryTalk que impide que la contraseña del usuario se procese apropiadamente • https://us-cert.cisa.gov/ics/advisories/icsa-21-054-01 • CWE-916: Use of Password Hash With Insufficient Computational Effort •