ICSA-21-138-01_Emerson Rosemount X-STREAM
Emerson X-STREAM enhanced analyzer models (XEGP, XEGK, XEXF, XEFD) are affected by multiple vulnerabilities in web interface access controls. Weaknesses include insufficient cryptography (CWE-326), unrestricted file uploads (CWE-434), path traversal (CWE-22), exposure of sensitive information (CWE-539), cross-site scripting (CWE-79), and improper input validation (CWE-1021). An unauthenticated attacker with network access can read sensitive configuration data, extract stored credentials, or upload malicious files to the device. No public exploits are known at this time.
- Network access to the X-STREAM device's web interface (typically port 80/443)
- Device must be connected to network (no air-gap protection)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/19e63868-77d1-4eee-a357-609fa45ef89aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.