Rockwell Automation FactoryTalk Linx Software (Update A)
Multiple critical vulnerabilities in Rockwell Automation FactoryTalk Linx and related engineering software allow authenticated users to exploit input validation (CWE-20) and path traversal (CWE-22) flaws. Affected versions include RSLinx Classic v4.11.00 and prior, FactoryTalk Linx versions 6.00, 6.10, 6.11, Studio 5000 Logix Designer v32 and prior, Connected Components Workbench v12 and prior, ControlFLASH v14 and later, ControlFLASH Plus, FactoryTalk Asset Centre v9 and later, Studio 5000 Launcher v31 and later, and FactoryTalk Linx CommDTM. Successful exploitation could allow remote code execution, denial-of-service, or unauthorized access to sensitive information.
- Network access to the engineering workstation or server running affected Rockwell Automation software
- Valid user credentials for the Rockwell software application
- The workstation or server must be running one of the vulnerable versions listed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9c53c809-2a9a-419c-b98b-c041aa87a03cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.