Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vhfm-8gx7-f4cp

Опубликовано: 13 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 4.1

Описание

The underlying feedback mechanism of

Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

The underlying feedback mechanism of

Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

EPSS

Процентиль: 12%
0.0004
Низкий

4.1 Medium

CVSS3

Дефекты

CWE-346

Связанные уязвимости

CVSS3: 4.1
nvd
больше 2 лет назад

The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

CVSS3: 4.1
fstec
больше 2 лет назад

Уязвимость программного обеспечения управления производственными процессами FactoryTalk Policy Manager и системной службы FactoryTalk System Services , позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 12%
0.0004
Низкий

4.1 Medium

CVSS3

Дефекты

CWE-346