- What is the severity of CVE-2024-21917?
- CVE-2024-21917 has been scored as a critical severity vulnerability.
- How to fix CVE-2024-21917?
- To fix CVE-2024-21917: Customers using Rockwell Automation FactoryTalk® Service Platform are encouraged to apply the risk mitigations, if possible. Additionally, we encourage customers to implement our suggested security best practices to minimize the risk of vulnerability. * Update to v6.40 or later. * Set DCOM authentication level to 6, Mitigating Microsoft DCOM Hardening Patch (CVE-2021-26414) for Affected Rockwell Automation Products (custhelp.com) https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1134040 * When it is not possible to update to v6.40 or later, enable verification of the publisher information (i.e., digital signature) of any executable attempting to use the FactoryTalk® Services APIs. This helps prevent a malicious user from calling the API to receive the service token. This setting can be changed from the Application Authorization node located within System Policies using the FactoryTalk® Administration Console application. * Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
- Is CVE-2024-21917 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2024-21917 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-21917?
- CVE-2024-21917 affects Rockwell Automation FactoryTalk® Service Platform.