Festo: Several vulnerabilities in FactoryViews

Act Now9.8FSA-202302Jul 10, 2023
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

FactoryViews versions up to 1.5.2 contain approximately 200 vulnerabilities in bundled third-party applications, including issues related to input validation, path traversal, certificate validation, command injection, SQL injection, insecure deserialization, buffer overflows, and unsafe cryptographic practices. These vulnerabilities could enable remote code execution, unauthorized access, data manipulation, or denial of service without authentication. Version 1.6.0 is a security rollup that updates all bundled applications and fixes these vulnerabilities for FactoryViews (non-Lite). FactoryViews Lite version 1.1 cannot be patched independently; users must upgrade to version 1.7.0, which unifies the product line.

What this means
What could happen
FactoryViews contains approximately 200 vulnerabilities in bundled third-party applications that could allow an unauthenticated attacker to remotely execute code, read sensitive files, or disrupt operations. This affects all instances of FactoryViews Lite version 1.1 and earlier, for which no patch will be released.
Who's at risk
Organizations using Festo FactoryViews for industrial automation, process visualization, or facility management should prioritize this. FactoryViews is commonly deployed in manufacturing plants, water treatment facilities, and utilities as a supervisory control interface. All versions prior to 1.6.0 (non-Lite) and 1.7.0 (Lite) are affected.
How it could be exploited
An attacker on the network can send a crafted request to FactoryViews without authentication. The bundled vulnerable applications process the request and execute arbitrary code, allowing the attacker to run commands on the server, read configuration files or credentials, or crash the application.
Prerequisites
  • Network access to FactoryViews web interface (typically port 80 or 443)
  • No authentication required
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)affects safety systemsno patch available for FactoryViews Lite ≤1.1 until version 1.7.0
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
FactoryViews <1.6.0< 1.6.01.6.0
FactoryViews Lite <=1.1≤ 1.11.6.0
Remediation & Mitigation
0/5
Do now
0/4
HOTFIXUpgrade FactoryViews (non-Lite) to version 1.6.0 or later
HOTFIXUpgrade FactoryViews Lite to version 1.7.0 or later
WORKAROUNDRestrict network access to FactoryViews to engineering workstations and authorized operator terminals only using firewall rules or network segmentation
WORKAROUNDIf unable to patch FactoryViews Lite immediately, consider disabling or isolating affected instances until upgrade to version 1.7.0 is possible
Long-term hardening
0/1
HARDENINGPlace FactoryViews on an isolated OT network segment not directly reachable from corporate IT or the internet
CVEs (173)
CVE-2021-35604CVE-2021-37701CVE-2021-37712CVE-2021-37713CVE-2021-39134CVE-2021-39135CVE-2021-44531CVE-2021-44532CVE-2021-44533CVE-2021-46661CVE-2021-46662CVE-2021-46663CVE-2021-46664CVE-2021-46665CVE-2021-46666CVE-2021-46667CVE-2021-46668CVE-2021-46669CVE-2016-3078CVE-2022-1586CVE-2022-1587CVE-2016-5385CVE-2018-12882CVE-2018-14883CVE-2018-17082CVE-2022-21595CVE-2022-21824CVE-2022-23807CVE-2018-19518CVE-2018-19935CVE-2022-23808CVE-2019-9020CVE-2022-27376CVE-2019-9021CVE-2022-27377CVE-2019-9022CVE-2022-27378CVE-2019-9023CVE-2022-27379CVE-2019-9024CVE-2022-27380CVE-2019-9025CVE-2022-27381CVE-2019-9637CVE-2022-27382CVE-2019-9638CVE-2022-27383CVE-2019-9639CVE-2022-27384CVE-2019-9640CVE-2022-27385CVE-2019-9641CVE-2022-27386CVE-2019-11034CVE-2022-27387CVE-2019-11035CVE-2022-27444CVE-2019-11036CVE-2022-27445CVE-2019-11039CVE-2022-27446CVE-2019-11040CVE-2022-27447CVE-2019-11041CVE-2022-27448CVE-2019-11042CVE-2022-27449CVE-2019-11043CVE-2022-27451CVE-2019-11044CVE-2022-27452CVE-2019-11045CVE-2022-27455CVE-2019-11046CVE-2022-27456CVE-2019-11047CVE-2022-27457CVE-2019-11048CVE-2022-27458CVE-2019-11049CVE-2022-31625CVE-2019-11050CVE-2022-31626CVE-2019-20454CVE-2022-31628CVE-2020-7059CVE-2022-31629CVE-2020-7060CVE-2022-32081CVE-2018-14851CVE-2020-7061CVE-2022-32082CVE-2020-7062CVE-2022-32083CVE-2020-7063CVE-2022-32084CVE-2020-7064CVE-2022-32085CVE-2020-7065CVE-2022-32086CVE-2020-7066CVE-2022-32087CVE-2006-20001CVE-2020-7068CVE-2022-32088CVE-2020-7069CVE-2022-32089CVE-2020-7070CVE-2022-32091CVE-2020-7071CVE-2022-32212CVE-2020-28948CVE-2022-32213CVE-2020-28949CVE-2022-32214CVE-2020-36193CVE-2022-32215CVE-2021-2007CVE-2022-32222CVE-2021-2011CVE-2022-32223CVE-2021-2022CVE-2022-35255CVE-2021-2032CVE-2022-35256CVE-2021-2144CVE-2022-36313CVE-2021-2154CVE-2022-36760CVE-2021-2166CVE-2022-37436CVE-2021-2174CVE-2022-43548CVE-2021-2180CVE-2022-47015CVE-2021-2194CVE-2023-0567CVE-2021-2372CVE-2023-0568CVE-2021-2389CVE-2023-0662CVE-2021-3807CVE-2023-23918CVE-2021-3918CVE-2023-23919CVE-2021-21702CVE-2023-23920CVE-2021-21703CVE-2023-23936CVE-2021-21704CVE-2023-24807CVE-2021-21705CVE-2023-25690CVE-2021-21706CVE-2023-25727CVE-2021-21707CVE-2023-27522CVE-2021-21708CVE-2021-22883CVE-2021-22884CVE-2021-22918CVE-2021-22921CVE-2021-22930CVE-2021-22931CVE-2021-22939CVE-2021-22940CVE-2021-22959CVE-2021-22960CVE-2021-23362CVE-2021-27290CVE-2021-27928CVE-2021-32803CVE-2021-32804
API: /api/v1/advisories/b04e5cad-75ec-4964-a2c0-20a92ac218e4