CVE-2021-27468

Rockwell Automation FactoryTalk AssetCentre SQL Injection

Description

The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Remediation

Solution:

  • Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
  • As an additional mitigation, Rockwell Automation encourages users who are unable to upgrade or are concerned about unauthorized client connections to use built in security features found within FactoryTalk AssetCentre. Users should follow guidance found in QA46277. IPsec would minimize exposure to unauthorized clients and has been tested in FactoryTalk AssetCentre v9-v11

Workaround:

  • Rockwell Automation recommends the following software/PC-based mitigation strategies: Run all software as User, not as an Administrator, to minimize the impact of malicious code on the infected system. Use Microsoft AppLocker or other similar allow list applications to help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledge Base Article QA17329 Ensure the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum number of rights as needed.
  • Rockwell Automation recommends the following general mitigations: Use trusted software, software patches, antivirus/antimalware programs and interact only with trusted web sites and attachments. Minimize network exposure for all control system devices and/or systems and ensure they are not accessible from the Internet. For further information about the risks of unprotected Internet accessible control systems, please see Knowledgebase Article PN715 Locate control system networks and devices behind firewalls and isolate them from the business network. When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize a VPN is only as secure as the connected devices.

Category

10.0
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.06%
Vendor Advisory rockwellautomation.com
Affected: Rockwell Automation FactoryTalk AssetCentre
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-27468?
CVE-2021-27468 has been scored as a critical severity vulnerability.
How to fix CVE-2021-27468?
To fix CVE-2021-27468: Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
Is CVE-2021-27468 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-27468 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-27468?
CVE-2021-27468 affects Rockwell Automation FactoryTalk AssetCentre.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.