ID

VAR-202306-1139


CVE

CVE-2023-2639


TITLE

Rockwell Automation FactoryTalk Services Platform Trust Management Issue Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-00983

DESCRIPTION

The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.   This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. Rockwell Automation FactoryTalk Services Platform is a service platform composed of multiple products from Rockwell Automation, an American company. It provides general services to applications, such as diagnostic information, health monitoring, and real-time data access

Trust: 1.53

sources: NVD: CVE-2023-2639 // CNVD: CNVD-2025-00983 // VULMON: CVE-2023-2639

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-00983

AFFECTED PRODUCTS

vendor:rockwellautomationmodel:factorytalk policy managerscope:eqversion:6.11.0

Trust: 1.0

vendor:rockwellautomationmodel:factorytalk system servicesscope:eqversion:6.11.0

Trust: 1.0

vendor:rockwellmodel:automation factorytalk services platformscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-00983 // NVD: CVE-2023-2639

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-2639
value: MEDIUM

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2023-2639
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2025-00983
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202306-1030
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2025-00983
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-2639
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

PSIRT@rockwellautomation.com: CVE-2023-2639
baseSeverity: MEDIUM
baseScore: 4.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.3
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-00983 // CNNVD: CNNVD-202306-1030 // NVD: CVE-2023-2639 // NVD: CVE-2023-2639

PROBLEMTYPE DATA

problemtype:CWE-346

Trust: 1.0

sources: NVD: CVE-2023-2639

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-1030

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-202306-1030

PATCH

title:Patch for Rockwell Automation FactoryTalk Services Platform Trust Management Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/649956

Trust: 0.6

title:Rockwell Automation FactoryTalk Services Platform Fixes for access control error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=243030

Trust: 0.6

sources: CNVD: CNVD-2025-00983 // CNNVD: CNNVD-202306-1030

EXTERNAL IDS

db:NVDid:CVE-2023-2639

Trust: 2.3

db:CNVDid:CNVD-2025-00983

Trust: 0.6

db:CNNVDid:CNNVD-202306-1030

Trust: 0.6

db:VULMONid:CVE-2023-2639

Trust: 0.1

sources: CNVD: CNVD-2025-00983 // VULMON: CVE-2023-2639 // CNNVD: CNNVD-202306-1030 // NVD: CVE-2023-2639

REFERENCES

url:https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2023-2639

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-2639/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2025-00983 // VULMON: CVE-2023-2639 // CNNVD: CNNVD-202306-1030 // NVD: CVE-2023-2639

SOURCES

db:CNVDid:CNVD-2025-00983
db:VULMONid:CVE-2023-2639
db:CNNVDid:CNNVD-202306-1030
db:NVDid:CVE-2023-2639

LAST UPDATE DATE

2025-01-24T22:57:09.980000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-00983date:2025-01-13T00:00:00
db:VULMONid:CVE-2023-2639date:2023-06-13T00:00:00
db:CNNVDid:CNNVD-202306-1030date:2023-06-27T00:00:00
db:NVDid:CVE-2023-2639date:2023-06-26T16:22:05.290

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-00983date:2025-01-08T00:00:00
db:VULMONid:CVE-2023-2639date:2023-06-13T00:00:00
db:CNNVDid:CNNVD-202306-1030date:2023-06-13T00:00:00
db:NVDid:CVE-2023-2639date:2023-06-13T21:15:10.043