Rockwellautomation Thinmanager
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Rockwellautomation Thinmanager.
By the Year
In 2026 there have been 0 vulnerabilities in Rockwellautomation Thinmanager. Last year, in 2025 Thinmanager had 2 security vulnerabilities published. Right now, Thinmanager is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 6.65 |
| 2024 | 7 | 8.67 |
| 2023 | 5 | 7.76 |
| 2022 | 1 | 9.80 |
It may take a day or so for new Thinmanager vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Rockwellautomation Thinmanager Security Vulnerabilities
ThinManager DoS via Type18 Msg MemAlloc Error
CVE-2025-3618
5.5 - Medium
- April 15, 2025
A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 18 messages. If exploited, a threat actor could cause a denial-of-service on the target software.
Privilege Escalation in Rockwell ThinManager via Temp Folder ACL
CVE-2025-3617
7.8 - High
- April 15, 2025
A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges.
DoS via Crafted Messages in Undetermined Device
CVE-2024-10387
7.5 - High
- October 25, 2024
CVE-2024-10387 IMPACT A Denial-of-Service vulnerability exists in the affected product. The vulnerability could allow a threat actor with network access to send crafted messages to the device, potentially resulting in Denial-of-Service.
Auth Bypass Enables Remote Database Manipulation in IoT Device
CVE-2024-10386
9.8 - Critical
- October 25, 2024
CVE-2024-10386 IMPACT An authentication vulnerability exists in the affected product. The vulnerability could allow a threat actor with network access to send crafted messages to the device, potentially resulting in database manipulation.
ThinManager Path Traversal & RCE via POST Request
CVE-2024-45826
8.8 - High
- September 12, 2024
CVE-2024-45826 IMPACT Due to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager® processes a crafted POST request. If exploited, a user can install an executable file.
Externally Controlled Reference to a Resource in Another Sphere
Rockwell ThinServer Arbitrary File Read via Junction Abuse
CVE-2024-7986
7.5 - High
- August 23, 2024
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer service to read arbitrary files by creating a junction that points to the target directory.
Unauthenticated DoS via Message Injection in Rockwell ThinServer
CVE-2024-5990
7.5 - High
- June 25, 2024
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer and cause a denial-of-service condition on the affected device.
SQLi in Rockwell ThinServer Null Auth RCE via Malicious Message
CVE-2024-5989
9.8 - Critical
- June 25, 2024
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer.
Unauth RCE via Malicious Message Injection on Rockwell ThinServer
CVE-2024-5988
9.8 - Critical
- June 25, 2024
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer.
Path Traversal in Rockwell ThinServer API: Remote File Read
CVE-2023-2913
6.5 - Medium
- July 18, 2023
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the servers file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
Directory traversal
Rockwell Automation ThinManager Medium Strength Cipher Vulnerability
CVE-2023-2443
7.5 - High
- May 11, 2023
Rockwell Automation ThinManager product allows the use of medium strength ciphers. If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API.
Inadequate Encryption Strength
Heap Overread in Rockwell ThinManager ThinServer Crash Exploit
CVE-2023-27857
7.5 - High
- March 22, 2023
In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.
Out-of-bounds Read
Path Traversal in Rockwell Automation ThinManager ThinServer
CVE-2023-27856
7.5 - High
- March 22, 2023
In affected versions, path traversal exists when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.
Directory traversal
CVE-2023-27855: Path Traversal in Rockwell ThinServer Enables RCE
CVE-2023-27855
9.8 - Critical
- March 22, 2023
In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.
Directory traversal
Heap-based buffer overflow in Rockwell Automation ThinServer 11.0.0-13.0.0
CVE-2022-38742
9.8 - Critical
- September 23, 2022
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.
Memory Corruption
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Rockwellautomation Thinmanager or by Rockwellautomation? Click the Watch button to subscribe.