A server-side request forgery security issue exists within Rockwell Automation ThinManager® software due to the lack of input sanitization. Authenticated attackers can exploit this vulnerability by specifying external SMB paths, exposing the ThinServer® service account NTLM hash.
References
| Link | Resource |
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1743.html | Vendor Advisory |
Configurations
History
20 Oct 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:* | |
| First Time |
Rockwellautomation thinmanager
Rockwellautomation |
|
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1743.html - Vendor Advisory | |
| CWE | CWE-918 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
09 Sep 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-09 13:15
Updated : 2025-10-20 19:17
NVD link : CVE-2025-9065
Mitre link : CVE-2025-9065
CVE.ORG link : CVE-2025-9065
JSON object : View
Products Affected
rockwellautomation
- thinmanager
