Rockwell Automation Products Face Critical Security Risks, Urgent Patching Required

CVE-2024-45823 and CVE-2024-45824

Two recently discovered vulnerabilities in Rockwell Automation’s FactoryTalk software products pose a serious threat to industrial control systems (ICS). The vulnerabilities, tracked as CVE-2024-45823 and CVE-2024-45824, could potentially allow unauthorized access and even remote code execution, opening the door for malicious attacks with devastating consequences.

Authentication Bypass in FactoryTalk Batch View (CVE-2024-45823)

The first vulnerability, rated with a CVSSv4 score of 9.2 (Critical), affects FactoryTalk Batch View 2.01.00. It stems from the use of shared secrets across accounts, enabling a threat actor to impersonate a legitimate user by exploiting additional information required during authentication. Successful exploitation could grant attackers unauthorized access to sensitive systems and data.

Remote Code Execution in FactoryTalk View Site Edition (CVE-2024-45824)

The second vulnerability, also rated 9.2 (Critical), impacts FactoryTalk View Site Edition versions 12.0, 13.0, and 14.0. This vulnerability allows for full unauthenticated remote code execution when chained with Path Traversal, Command Injection, and XSS Vulnerabilities. This implies that a remote attacker could potentially execute malicious code on affected systems without requiring any authentication, wreaking havoc on industrial operations.

Urgent Action Required

Rockwell Automation has released patches to address both vulnerabilities. Users are strongly advised to upgrade to the following corrected versions immediately:

  • FactoryTalk Batch View: Upgrade to version 3.00.00 or later.
  • FactoryTalk View Site Edition: Apply the patches available at the link provided by Rockwell Automation.

Protecting Critical Infrastructure

Industrial control systems are the backbone of critical infrastructure, including power grids, manufacturing plants, and transportation networks. These vulnerabilities underscore the importance of robust cybersecurity practices in the industrial sector. Organizations are urged to:

  • Prioritize patching: Apply security updates promptly to mitigate known vulnerabilities.
  • Implement strong access controls: Enforce strict authentication and authorization mechanisms.
  • Monitor network activity: Utilize intrusion detection and prevention systems to identify and block suspicious activity.
  • Conduct regular security assessments: Identify and address potential weaknesses in ICS environments.

Related Posts: