Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-10387", "assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0", "state": "PUBLISHED", "assignerShortName": "Rockwell", "dateReserved": "2024-10-25T12:38:30.428Z", "datePublished": "2024-10-25T17:04:36.334Z", "dateUpdated": "2024-10-25T20:14:03.121Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "FactoryTalk ThinManager", "vendor": "Rockwell Automation", "versions": [{"status": "affected", "version": "11.2.0-11.2.9"}, {"status": "affected", "version": "12.0.0-12.0.7"}, {"status": "affected", "version": "12.1.0-12.1.8"}, {"status": "affected", "version": "13.0.0-13.0.5"}, {"status": "affected", "version": "13.1.0-13.1.3"}, {"status": "affected", "version": "13.2.0-13.2.2"}, {"status": "affected", "version": "14.0.0"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "Tenable Network Security"}], "datePublic": "2024-10-25T17:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p><b><u>CVE-2024-10387 IMPACT</u></b><u></u></p>\n\n<p>A Denial-of-Service\nvulnerability exists in the affected product. The vulnerability could allow a\nthreat actor with network access to send crafted messages to the device,\npotentially resulting in Denial-of-Service.</p>"}], "value": "CVE-2024-10387 IMPACT\n\n\n\nA Denial-of-Service\nvulnerability exists in the affected product. The vulnerability could allow a\nthreat actor with network access to send crafted messages to the device,\npotentially resulting in Denial-of-Service."}], "impacts": [{"capecId": "CAPEC-129", "descriptions": [{"lang": "en", "value": "CAPEC-129 Pointer Manipulation"}]}], "metrics": [{"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}, {"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-125", "description": "CWE-125 Out-of-bounds Read", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "b73dd486-f505-4403-b634-40b078b177f0", "shortName": "Rockwell", "dateUpdated": "2024-10-25T17:04:36.334Z"}, "references": [{"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: var(--wht);\">If able,\nnavigate to the </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://thinmanager.com/downloads/\">ThinManager\u00ae download site</a><span style=\"background-color: var(--wht);\"> and upgrade to a corrected version of ThinManager\u00ae</span>\n\n<br><br><p>11.2.10<br>\n</p>\n\n<p>12.0.8<br>\n</p>\n\n<p>12.1.9<br>\n</p>\n\n<p>13.0.6 </p>\n\n\n\n<p>13.1.4 </p>\n\n\n\n<p>13.2.3 </p>\n\n\n\n<p>14.0.1</p>\n\n\n\n\n\n\n\n<br>"}], "value": "If able,\nnavigate to the ThinManager\u00ae download site https://thinmanager.com/downloads/ and upgrade to a corrected version of ThinManager\u00ae\n\n\n\n11.2.10\n\n\n\n\n\n12.0.8\n\n\n\n\n\n12.1.9\n\n\n\n\n\n13.0.6 \n\n\n\n\n\n13.1.4 \n\n\n\n\n\n13.2.3 \n\n\n\n\n\n14.0.1"}], "source": {"discovery": "EXTERNAL"}, "title": "Rockwell Automation FactoryTalk ThinManager Denial-of-Service Vulnerability", "workarounds": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p><span style=\"background-color: var(--wht);\">If able,\nnavigate to the </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://thinmanager.com/downloads/\">ThinManager\u00ae download site</a><span style=\"background-color: var(--wht);\"> and upgrade to a corrected version of ThinManager\u00ae</span></p><p>Implement\nnetwork hardening for ThinManager\u00ae Device(s) by limiting communications to TCP\n2031 to only the devices that need connection to the ThinManager\u00ae</p>\n\n\n\n<p>For\ninformation on how to mitigate Security Risks on industrial automation control\nsystems, we encourage customers to implement our suggested <a target=\"_blank\" rel=\"nofollow\" href=\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight\">security best\npractices</a> to\nminimize the risk of the vulnerability.</p>"}], "value": "If able,\nnavigate to the ThinManager\u00ae download site https://thinmanager.com/downloads/ and upgrade to a corrected version of ThinManager\u00ae\n\nImplement\nnetwork hardening for ThinManager\u00ae Device(s) by limiting communications to TCP\n2031 to only the devices that need connection to the ThinManager\u00ae\n\n\n\n\n\nFor\ninformation on how to mitigate Security Risks on industrial automation control\nsystems, we encourage customers to implement our suggested security best\npractices to\nminimize the risk of the vulnerability."}], "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "rockwellautomation", "product": "thinmanager", "cpes": ["cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "11.2.0", "status": "affected", "lessThanOrEqual": "11.2.9", "versionType": "custom"}, {"version": "12.0.0", "status": "affected", "lessThanOrEqual": "12.0.7", "versionType": "custom"}, {"version": "12.1.0", "status": "affected", "lessThanOrEqual": "12.1.8", "versionType": "custom"}, {"version": "13.0.0", "status": "affected", "lessThanOrEqual": "13.0.5", "versionType": "custom"}, {"version": "13.1.0", "status": "affected", "lessThanOrEqual": "13.1.3", "versionType": "custom"}, {"version": "13.2.0", "status": "affected", "lessThanOrEqual": "13.2.2", "versionType": "custom"}, {"version": "14.0.0", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-25T20:10:20.475990Z", "id": "CVE-2024-10387", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-25T20:14:03.121Z"}}]}}