Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-2637 CVE-2023-2638 CVE-2023-2639 |
CWE-ID | CWE-321 CWE-287 CWE-346 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
FactoryTalk Policy Manager Other software / Other software solutions FactoryTalk System Services Other software / Other software solutions |
Vendor | Rockwell Automation |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU77290
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-2637
CWE-ID:
CWE-321 - Use of Hard-coded Cryptographic Key
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a hard-coded cryptographic key. A local user can generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database.
MitigationInstall updates from vendor's website.
Vulnerable software versionsFactoryTalk Policy Manager: 6.11.0
FactoryTalk System Services: 6.11.0
CPE2.3http://www.cisa.gov/news-events/ics-advisories/icsa-23-164-02
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77291
Risk: Low
CVSSv3.1: 5.2 [CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-2638
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests in FTSSBackupRestore.exe. A local user can load backup archive without password protection by FactoryTalk System Services as a valid backup when a restore procedure takes place.
MitigationInstall updates from vendor's website.
Vulnerable software versionsFactoryTalk Policy Manager: 6.11.0
FactoryTalk System Services: 6.11.0
CPE2.3http://www.cisa.gov/news-events/ics-advisories/icsa-23-164-02
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77292
Risk: Low
CVSSv3.1: 3.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-2639
CWE-ID:
CWE-346 - Origin Validation Error
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to origin validation error. A remote user can trick a victim to visit a specially crafted website and gain access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsFactoryTalk Policy Manager: 6.11.0
FactoryTalk System Services: 6.11.0
CPE2.3http://www.cisa.gov/news-events/ics-advisories/icsa-23-164-02
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.