Improper Input Validation (CWE-20)
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device.
This vulnerability could allow an unauthenticated attacker to cause a denial-of-service condition on the affected Rockwell Automation ThinServer™ device. This could potentially disrupt operations and lead to system unavailability, impacting the normal functioning of the industrial control systems that rely on ThinServer™. The CVSS v4 base score for this vulnerability is 8.7 (HIGH severity), with the following key metrics: Attack Vector: Network, Attack Complexity: Low, Privileges Required: None, User Interaction: None, and Availability Impact: High. This indicates that the vulnerability is easily exploitable and can cause significant disruption to system availability.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch for this vulnerability is available. According to the patch details, Rockwell Automation has released an advisory titled "ThinManager® ThinServer™ Improper Input Validation Vulnerability" on June 25, 2024. The security team should review and apply this patch as soon as possible.
While specific mitigation steps are not provided in the given data, general recommendations for this type of vulnerability include: 1. Implement network segmentation to limit access to the affected ThinServer™ devices. 2. Use firewalls or other network security measures to restrict incoming traffic to these devices. 3. Monitor for unusual traffic or behavior targeting the ThinServer™ devices. 4. Apply the available patch from Rockwell Automation as soon as possible after appropriate testing. 5. Consider implementing additional input validation mechanisms if possible at the network or application level to filter out malicious messages. 6. Regularly check for updates and security advisories from Rockwell Automation regarding ThinManager® and ThinServer™ products.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-5990. See article
NVD published the first details for CVE-2024-5990
Feedly estimated the CVSS score as MEDIUM
This CVE started to trend in security discussions
Detection for the vulnerability has been added to Nessus (200986)
EPSS Score was set to: 0.04% (Percentile: 9.1%)
This CVE stopped trending in security discussions
A CVSS base score of 8.7 has been assigned.