CVE-2023-27856 (GCVE-0-2023-27856)
Vulnerability from cvelistv5 – Published: 2023-03-21 23:55 – Updated: 2025-02-25 21:22
VLAI?
Title
Rockwell Automation ThinManager ThinServer Path Traversal Download
Summary
In affected versions, path traversal exists when processing a message of type 8
in Rockwell Automation's ThinManager ThinServer.
An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.
Severity ?
7.5 (High)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Rockwell Automation | ThinManager ThinServer |
Affected:
6.x - 10.x
Affected: 11.0.0 - 11.0.5 Affected: 11.1.0 - 11.1.5 Affected: 11.2.0 - 11.2.6 Affected: 12.0.0 - 12.0.4 Affected: 12.1.0 - 12.1.5 Affected: 13.0.0 - 13.0.1 |
Credits
Security researchers from Tenable reported this to Rockwell Automation.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.592Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-27856",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T21:21:55.655746Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T21:22:03.982Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinManager ThinServer",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "6.x - 10.x"
},
{
"status": "affected",
"version": "11.0.0 - 11.0.5"
},
{
"status": "affected",
"version": "11.1.0 - 11.1.5"
},
{
"status": "affected",
"version": "11.2.0 - 11.2.6"
},
{
"status": "affected",
"version": "12.0.0 - 12.0.4"
},
{
"status": "affected",
"version": "12.1.0 - 12.1.5"
},
{
"status": "affected",
"version": "13.0.0 - 13.0.1"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Security researchers from Tenable reported this to Rockwell Automation."
}
],
"datePublic": "2023-03-21T13:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn affected versions, path traversal exists when processing a message of type 8\u003c/span\u003e\n\n in Rockwell Automation\u0027s ThinManager ThinServer. \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\u003c/span\u003e\n\n \u003c/span\u003e\n\n"
}
],
"value": "\n\n\nIn affected versions, path traversal exists when processing a message of type 8\n\n in Rockwell Automation\u0027s ThinManager ThinServer. \n\nAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\n\n \n\n"
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-22T00:02:03.568Z",
"orgId": "b73dd486-f505-4403-b634-40b078b177f0",
"shortName": "Rockwell"
},
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCustomers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "\nCustomers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.\n"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Rockwell Automation ThinManager ThinServer Path Traversal Download",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "b73dd486-f505-4403-b634-40b078b177f0",
"assignerShortName": "Rockwell",
"cveId": "CVE-2023-27856",
"datePublished": "2023-03-21T23:55:23.665Z",
"dateReserved": "2023-03-06T18:21:21.067Z",
"dateUpdated": "2025-02-25T21:22:03.982Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndIncluding\": \"10.0.2\", \"matchCriteriaId\": \"B3690F79-0AB9-4FBA-BCF0-BCCCF00EFD31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndIncluding\": \"11.0.5\", \"matchCriteriaId\": \"68D1B6ED-F052-4CAC-80B0-614AF4FA5455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.1.0\", \"versionEndIncluding\": \"11.1.5\", \"matchCriteriaId\": \"D8066DE9-ACFA-42F9-AC88-08FB8ACC745E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.2.0\", \"versionEndIncluding\": \"11.2.6\", \"matchCriteriaId\": \"ADF30A13-51AD-479B-B0C4-462C059D511B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndIncluding\": \"12.0.4\", \"matchCriteriaId\": \"2A809366-5838-445A-8034-787551292BA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.1.0\", \"versionEndIncluding\": \"12.1.5\", \"matchCriteriaId\": \"EDC56DD9-44E6-45C0-82F1-0D9EAA2343BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7FA8090-F7EB-4C5D-AD9D-7D82F34F34D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:thinmanager:13.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0486F851-53AC-41C5-9ECE-1EA2DB1D3FAC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\n\\n\\nIn affected versions, path traversal exists when processing a message of type 8\\n\\n in Rockwell Automation\u0027s ThinManager ThinServer. \\n\\nAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\\n\\n \\n\\n\"}]",
"id": "CVE-2023-27856",
"lastModified": "2024-11-21T07:53:35.160",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"PSIRT@rockwellautomation.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-03-22T00:15:12.810",
"references": "[{\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\", \"source\": \"PSIRT@rockwellautomation.com\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"PSIRT@rockwellautomation.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-27856\",\"sourceIdentifier\":\"PSIRT@rockwellautomation.com\",\"published\":\"2023-03-22T00:15:12.810\",\"lastModified\":\"2024-11-21T07:53:35.160\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\n\\n\\nIn affected versions, path traversal exists when processing a message of type 8\\n\\n in Rockwell Automation\u0027s ThinManager ThinServer. \\n\\nAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\\n\\n \\n\\n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"PSIRT@rockwellautomation.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"PSIRT@rockwellautomation.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"10.0.2\",\"matchCriteriaId\":\"B3690F79-0AB9-4FBA-BCF0-BCCCF00EFD31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.0.5\",\"matchCriteriaId\":\"68D1B6ED-F052-4CAC-80B0-614AF4FA5455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.1.0\",\"versionEndIncluding\":\"11.1.5\",\"matchCriteriaId\":\"D8066DE9-ACFA-42F9-AC88-08FB8ACC745E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.2.0\",\"versionEndIncluding\":\"11.2.6\",\"matchCriteriaId\":\"ADF30A13-51AD-479B-B0C4-462C059D511B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.0.4\",\"matchCriteriaId\":\"2A809366-5838-445A-8034-787551292BA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"EDC56DD9-44E6-45C0-82F1-0D9EAA2343BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FA8090-F7EB-4C5D-AD9D-7D82F34F34D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:thinmanager:13.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0486F851-53AC-41C5-9ECE-1EA2DB1D3FAC\"}]}]}],\"references\":[{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\",\"source\":\"PSIRT@rockwellautomation.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T12:23:30.592Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-27856\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-25T21:21:55.655746Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-25T21:21:59.270Z\"}}], \"cna\": {\"title\": \"Rockwell Automation ThinManager ThinServer Path Traversal Download\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Security researchers from Tenable reported this to Rockwell Automation.\"}], \"impacts\": [{\"capecId\": \"CAPEC-126\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-126 Path Traversal\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Rockwell Automation\", \"product\": \"ThinManager ThinServer\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.x - 10.x\"}, {\"status\": \"affected\", \"version\": \"11.0.0 - 11.0.5\"}, {\"status\": \"affected\", \"version\": \"11.1.0 - 11.1.5\"}, {\"status\": \"affected\", \"version\": \"11.2.0 - 11.2.6\"}, {\"status\": \"affected\", \"version\": \"12.0.0 - 12.0.4\"}, {\"status\": \"affected\", \"version\": \"12.1.0 - 12.1.5\"}, {\"status\": \"affected\", \"version\": \"13.0.0 - 13.0.1\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"\\nCustomers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eCustomers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2023-03-21T13:00:00.000Z\", \"references\": [{\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\n\\n\\nIn affected versions, path traversal exists when processing a message of type 8\\n\\n in Rockwell Automation\u0027s ThinManager ThinServer. \\n\\nAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\\n\\n \\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eIn affected versions, path traversal exists when processing a message of type 8\u003c/span\u003e\\n\\n in Rockwell Automation\u0027s ThinManager ThinServer. \\n\\n\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.\u003c/span\u003e\\n\\n \u003c/span\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"b73dd486-f505-4403-b634-40b078b177f0\", \"shortName\": \"Rockwell\", \"dateUpdated\": \"2023-03-22T00:02:03.568Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-27856\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-25T21:22:03.982Z\", \"dateReserved\": \"2023-03-06T18:21:21.067Z\", \"assignerOrgId\": \"b73dd486-f505-4403-b634-40b078b177f0\", \"datePublished\": \"2023-03-21T23:55:23.665Z\", \"assignerShortName\": \"Rockwell\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…