In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.
Solution:
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-170-05 | third party advisory us government resource |
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1126944 | vendor advisory |
http://packetstormsecurity.com/files/160156/Rockwell-FactoryTalk-View-SE-SCADA-Unauthenticated-Remote-Code-Execution.html | exploit vdb entry third party advisory |