CVE-2024-7986

7.5 HIGH

📋 TL;DR

This vulnerability in Rockwell Automation ThinManager ThinServer allows attackers to read arbitrary files by exploiting directory junction points. It affects organizations using vulnerable versions of ThinServer software, potentially exposing sensitive configuration files, credentials, or proprietary data.

💻 Affected Systems

Products:
  • Rockwell Automation ThinManager ThinServer
Versions: Versions prior to 11.2.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects ThinServer service running on Windows systems; requires ThinServer to be installed and running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive industrial control system data including credentials, configuration files, and proprietary operational data leading to operational disruption or further attacks.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, credentials, or proprietary information that could be used for reconnaissance or further exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized access to ThinServer instances.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves creating directory junctions to bypass access controls and read arbitrary files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.2.0 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1692.html

Restart Required: Yes

Instructions:

1. Download ThinManager version 11.2.0 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the ThinServer service.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ThinServer instances from untrusted networks and limit access to authorized systems only.

Service Account Hardening

windows

Run ThinServer service with minimal privileges and restrict file system access.

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to ThinServer instances
  • Monitor for unusual file access patterns and directory junction creation attempts

🔍 How to Verify

Check if Vulnerable:

Check ThinServer version via ThinManager console or Windows Services panel; versions below 11.2.0 are vulnerable.

Check Version:

Check ThinManager console or view ThinServer service properties in Windows Services

Verify Fix Applied:

Verify ThinServer version is 11.2.0 or higher and test that directory junction attacks no longer allow arbitrary file reads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from ThinServer process
  • Directory junction creation events in Windows security logs
  • Access to sensitive files by ThinServer service

Network Indicators:

  • Unusual network connections to ThinServer ports (default 2031/TCP)
  • Multiple file read requests from single source

SIEM Query:

source="windows_security" AND event_id="4656" AND process_name="*ThinServer*" AND object_type="File" AND access_mask="ReadData"

🔗 References

📤 Share & Export