Rockwell Automation FactoryTalk DLL Hijacking Vulnerabilities
FactoryTalk Services Platform and FactoryTalk View Studio are vulnerable to DLL hijacking attacks. An attacker can place a malicious DLL file in a directory where FactoryTalk searches for libraries during startup. When FactoryTalk loads the library, it may load the attacker's malicious DLL instead of the legitimate one, allowing arbitrary code execution with the privileges of the FactoryTalk process. This affects FactoryTalk Services Platform versions below 2.71.00 and FactoryTalk View Studio versions 8.00.00 and below.
- Write access to a directory where FactoryTalk searches for DLL files (typically the application directory or a directory in the DLL search path)
- FactoryTalk application must be running or started after the malicious DLL is placed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bd9d01ac-8cfa-4cc1-8ecd-a26a78483105Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.