Rockwell Automation FactoryTalk Services Platform
FactoryTalk Services Platform v2.90 and earlier contains a buffer overflow or similar memory issue (CWE-122) that allows a remote attacker to send a specially crafted network packet and cause the platform to crash or become unresponsive. This disrupts all communications between the platform and connected control devices. Exploitation requires only network access and no credentials or user interaction. No public exploits are currently known, but the vulnerability is straightforward to exploit given the low attack complexity.
- Network access to FactoryTalk Services Platform port (likely port 2222 or 44818 based on Rockwell automation services)
- No authentication required
- No user interaction needed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/49ac0d6c-7ca4-4a16-8842-d789e664e443Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.