Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
Solution:
Workaround:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 | us government resource third party advisory mitigation |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 | permissions required vendor advisory |