CVE-2024-7847

RSLogix™ 5 and RSLogix 500® Remote Code Execution Via VBA Embedded Script

Description

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

Remediation

Workaround:

  • Mitigations and Workarounds Users using the affected software are encouraged to apply the following mitigations and security best practices, where possible. ·       Deny the execution feature in FactoryTalk® Administration Console, when not needed, by navigating to “Policies”, selecting ‘”Enable/Disable VBA”, and then checking the “Deny” box to block VBA code execution. ·       Save project files in a Trusted® location where only administrators can modify it and verify file integrity. ·       Utilize the VBA editor protection feature, which locks the VBA code from viewing and editing by setting a password.

Category

8.8
CVSS
Severity: High
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.03%
Affected: Rockwell Automation RSLogix 500®
Affected: Rockwell Automation RSLogix™ Micro Developer and Starter
Affected: Rockwell Automation RSLogix™ 5
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-7847?
CVE-2024-7847 has been scored as a high severity vulnerability.
How to fix CVE-2024-7847?
As a workaround for remediating CVE-2024-7847: Mitigations and Workarounds Users using the affected software are encouraged to apply the following mitigations and security best practices, where possible. ·       Deny the execution feature in FactoryTalk® Administration Console, when not needed, by navigating to “Policies”, selecting ‘”Enable/Disable VBA”, and then checking the “Deny” box to block VBA code execution. ·       Save project files in a Trusted® location where only administrators can modify it and verify file integrity. ·       Utilize the VBA editor protection feature, which locks the VBA code from viewing and editing by setting a password.
Is CVE-2024-7847 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-7847 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-7847?
CVE-2024-7847 affects Rockwell Automation RSLogix 500®, Rockwell Automation RSLogix™ Micro Developer and Starter, Rockwell Automation RSLogix™ 5.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.