Rockwell Automation FactoryTalk Linx and FactoryTalk Services Platform
FactoryTalk Linx software and FactoryTalk Services Platform versions 6.20 and earlier contain improper input validation vulnerabilities (CWE-755, CWE-770) that can be triggered by malicious network packets sent to EtherNet/IP or CIP protocol ports (2222, 44818). Successful exploitation results in a denial-of-service condition, causing the FactoryTalk application to crash. Rockwell Automation has not issued patches for these vulnerabilities and recommends network-based and configuration mitigations instead.
- Network reachability to the engineering workstation or server running FactoryTalk Linx or FactoryTalk Services Platform on port 2222 or 44818 (EtherNet/IP or CIP protocol)
- No authentication required to send a malicious packet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ca7dbe27-eb44-40ba-8a1e-116764085392Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.