CVE-2023-2917

9.8 CRITICAL

📋 TL;DR

CVE-2023-2917 is a critical path traversal vulnerability in Rockwell Automation ThinManager Thinserver that allows unauthenticated remote attackers to upload arbitrary files to any directory on the server. This can lead to remote code execution. Organizations using affected ThinManager versions are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation ThinManager Thinserver
Versions: Versions prior to 11.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the synchronization protocol processing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, ransomware deployment, or disruption of industrial operations.

🟠

Likely Case

Unauthorized file upload leading to webshell installation, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, application whitelisting, and least privilege controls are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows attackers with network access to compromise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted synchronization protocol messages but does not require authentication, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.0.0 or later

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471

Restart Required: Yes

Instructions:

1. Download ThinManager version 11.0.0 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the ThinServer service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ThinManager servers from untrusted networks and implement strict firewall rules.

Disable Unnecessary Services

windows

Disable synchronization protocol if not required for operations.

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to ThinManager servers only from trusted sources.
  • Deploy application whitelisting to prevent execution of unauthorized files that could be uploaded via this vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check ThinManager version in application interface or Windows Programs and Features. Versions below 11.0.0 are vulnerable.

Check Version:

Check ThinManager application interface or Windows Control Panel > Programs and Features

Verify Fix Applied:

Verify ThinManager version is 11.0.0 or higher and test that file upload attempts with path traversal payloads are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events in ThinServer directories
  • Failed or successful file upload attempts with suspicious filenames
  • Synchronization protocol messages with path traversal patterns

Network Indicators:

  • Unusual synchronization protocol traffic from untrusted sources
  • File upload attempts to ThinServer port

SIEM Query:

source="ThinServer" AND (event="file_upload" OR event="sync_protocol") AND (filename CONTAINS "..\\" OR filename CONTAINS "../")

🔗 References

📤 Share & Export