Emerson AMS Device Manager
AMS Device Manager versions 12.0 through 13.5 contain multiple vulnerabilities (CVE-2018-14808 and others, CWE-284 and CWE-269) that allow unauthorized remote code execution and malware injection. The vulnerabilities stem from improper input validation and access control enforcement. An attacker can exploit these flaws to execute arbitrary code on the AMS Device Manager host, potentially gaining control over field device configurations and monitoring functions. The vulnerability cannot be exploited if application whitelisting is implemented.
- Network access to the AMS Device Manager application port
- No application whitelisting deployed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7a04d59b-d897-4fd1-b044-a8abfda3ebafGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.