Rockwell Automation’s ThinManager software, a tool used for managing visualization resources in industrial environments, has been identified with a critical vulnerability that could lead to remote code execution. This vulnerability is present in ThinManager versions 13.1.0 to 13.2.1 and arises from improper input validation. The vulnerability specifically stems from a path traversal issue and an externally controlled reference to a resource, which, if exploited, allows attackers to send crafted POST requests that could lead to arbitrary code execution. This issue, identified as CVE-2024-45826, has a CVSS v4 score of 8.5, indicating significant risk.
The vulnerability presents a low attack complexity but can be exploited remotely, making it accessible to attackers without direct access to the targeted system. If successfully exploited, attackers could install executable files that could compromise the integrity of the system and allow for further malicious actions. While there have been no reports of public exploitation of this vulnerability, the potential for exploitation remains high due to its remote accessibility and low attack complexity.
To mitigate the risks associated with this vulnerability, Rockwell Automation has recommended that users update their ThinManager software to specific versions. Users with ThinManager version 13.1.X should upgrade to version 13.1.3 or later, while those using version 13.2.X should update to version 13.2.2 or later. In cases where users are unable to update to these versions, they are advised to implement security best practices, such as minimizing network exposure and ensuring that control systems are isolated from business networks. Additionally, CISA suggests that users employ secure methods like Virtual Private Networks (VPNs) to reduce the attack surface when remote access is necessary.
CISA has also emphasized the importance of taking a proactive approach to cybersecurity by following best practices for securing industrial control systems. These include performing impact assessments and risk evaluations before deploying defensive measures, as well as staying updated on the latest security recommendations and patches. CISA further highlights the need to protect against social engineering attacks, urging users to avoid clicking on links or opening attachments from unsolicited emails. With these mitigations in place, organizations can reduce the likelihood of successful exploitation of the ThinManager vulnerability.
Reference: