Rockwell Automation ISaGRAF5 Runtime (Update A)
ISaGRAF5 Runtime contains multiple vulnerabilities including improper input validation (CWE-23), inadequate credential management (CWE-256), unencrypted transmission of sensitive data (CWE-319), untrusted search path execution (CWE-427), and improper key management (CWE-321). Successful exploitation may result in remote code execution, information disclosure, or denial of service on affected Rockwell Micro800 controllers, GE ALSPA distributed control systems, AADvance Controllers, ISaGRAF Free Runtime, and Xylem MultiSmart devices. Rockwell Automation has not released patches for any affected products.
- High privilege credentials for engineering workstation or engineering tools
- Network access to the ISaGRAF runtime controller
- Affected version of ISaGRAF runtime installed on target device
- Ability to interact with runtime configuration or deployment interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0af64437-167b-448d-811f-788e2d13d8a5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.