{"uuid": "a76f6d71-cf49-48d4-a9b2-d7fb5bd740cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3617", "type": "seen", "source": "https://t.me/cvedetector/22983", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3617 - Rockwell Automation ThinManager Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3617 \nPublished : April 15, 2025, 6:15 p.m. | 1\u00a0hour, 3\u00a0minutes ago \nDescription : A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T21:37:43.000000Z"}