CVE-2021-32960

Rockwell Automation FactoryTalk Services Platform Protection Mechanism Failure

Description

Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.

Remediation

Solution:

  • Rockwell Automation encourages those using the affected software to update to FactoryTalk Services Platform v6.20 or later to address the associated risk. Please see the Rockwell Automation publication regarding this issue for more information.

Workaround:

  • Users who are unable to update are directed towards risk mitigation strategies provided below and are encouraged, when possible, to combine these tactics with the general security guidelines to employ multiple strategies simultaneously. When possible, do not utilize remote desktop connections. Use Microsoft Event Logger or similar event logging application to monitor atypical remote desktop connections and disconnections. Information on Setting up Windows Event Logs is available at Knowledgebase Article QA5965 Rockwell Automation recommends the following general security guidelines: Run all software as User, not as an Administrator, to minimize the impact of malicious code on the infected system. Ensure the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum number of rights as needed. When remote access is required, use secure methods, such as virtual private networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices. Please see the Rockwell Automation publication regarding this issue for more information.

Categories

8.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.04%
Vendor Advisory custhelp.com
Affected: Rockwell Automation FactoryTalk Services Platform
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 us government resource third party advisory mitigation
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 permissions required vendor advisory

Frequently Asked Questions

What is the severity of CVE-2021-32960?
CVE-2021-32960 has been scored as a high severity vulnerability.
How to fix CVE-2021-32960?
To fix CVE-2021-32960: Rockwell Automation encourages those using the affected software to update to FactoryTalk Services Platform v6.20 or later to address the associated risk. Please see the Rockwell Automation publication regarding this issue for more information.
Is CVE-2021-32960 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2021-32960 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-32960?
CVE-2021-32960 affects Rockwell Automation FactoryTalk Services Platform.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.