{"api_version":"1","generated_at":"2026-04-23T15:11:15+00:00","cve":"CVE-2023-27857","urls":{"html":"https://cve.report/CVE-2023-27857","api":"https://cve.report/api/cve/CVE-2023-27857.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-27857","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-27857"},"summary":{"title":"CVE-2023-27857","description":"In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field\n\n\n\n in Rockwell Automation's ThinManager ThinServer.  An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.","state":"PUBLIC","assigner":"PSIRT@rockwellautomation.com","published_at":"2023-03-22 02:15:00","updated_at":"2024-01-09 02:31:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640","name":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640","refsource":"MISC","tags":[],"title":"Internet Archive: Scheduled Maintenance","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-27857","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27857","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"27857","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rockwellautomation","cpe5":"thinmanager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"27857","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rockwellautomation","cpe5":"thinmanager","cpe6":"13.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-27857","ASSIGNER":"PSIRT@rockwellautomation.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"\n In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field\n\n\n\n in Rockwell Automation's ThinManager ThinServer.  An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.\n\n\n\n \n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-125 Out-of-bounds Read","cweId":"CWE-125"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Rockwell Automation","product":{"product_data":[{"product_name":"ThinManager ThinServer","version":{"version_data":[{"version_affected":"=","version_value":"6.x - 10.x"},{"version_affected":"=","version_value":"11.0.0 - 11.0.5"},{"version_affected":"=","version_value":"11.1.0 - 11.1.5"},{"version_affected":"=","version_value":"11.2.0 - 11.2.6"},{"version_affected":"=","version_value":"12.0.0 - 12.0.4"},{"version_affected":"=","version_value":"12.1.0 - 12.1.5"},{"version_affected":"=","version_value":"13.0.0 - 13.0.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640","refsource":"MISC","name":"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1138640"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Customers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.</span><br>"}],"value":"\nCustomers are directed to update to versions of the product that correct the vulnerability as listed in the reference article.\n"}],"credits":[{"lang":"en","value":"Security researchers from Tenable reported this to Rockwell Automation."}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-03-22 02:15:00","lastModifiedDate":"2024-01-09 02:31:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:13.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}