CVE-2025-3617

A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*

History

14 Jul 2025, 19:16

Type Values Removed Values Added
References () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1727.html - () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1727.html - Vendor Advisory
CPE cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*
First Time Rockwellautomation thinmanager
Rockwellautomation
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

17 Apr 2025, 18:15

Type Values Removed Values Added
CWE CWE-276
Summary
  • (es) Existe una vulnerabilidad de escalada de privilegios en Rockwell Automation ThinManager. Al iniciarse el software, se eliminan archivos de la carpeta temporal, lo que provoca que la entrada de control de acceso del directorio herede los permisos del directorio principal. Si se explota, un atacante podría heredar privilegios elevados.

15 Apr 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-15 18:15

Updated : 2025-07-14 19:16


NVD link : CVE-2025-3617

Mitre link : CVE-2025-3617

CVE.ORG link : CVE-2025-3617


JSON object : View

Products Affected

rockwellautomation

  • thinmanager
CWE
CWE-276

Incorrect Default Permissions