Rockwell Automation ThinManager
Vulnerabilities in Rockwell Automation ThinManager ThinServer versions 6.x through 13.0.1 allow remote code execution or denial of service. The flaws (path traversal and buffer overflow) can be exploited by sending unauthenticated requests to port 2031/TCP. Successful exploitation grants attacker control of the ThinServer process, potentially enabling manipulation of HMI displays, process parameters, or termination of the visualization service. Versions 6.x–10.x are retired. Patched versions are available: 11.0.6, 11.1.6, 11.2.7, 12.0.5, 12.1.6, 13.0.2. If patching is delayed, restrict port 2031/TCP access to known thin clients and ThinManager servers, and ensure the server is not accessible from the Internet.
- Network reachability to port 2031/TCP
- No credentials required
- ThinServer running a vulnerable version (6.x through 13.0.1)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5dc5bff4-5362-420d-8884-0140801f1fbc