Rockwell Automation ISaGRAF
Rockwell Automation workbench applications (Connected Component Workbench, ISaGRAF Workbench, and Safety Instrumented Systems Workstation) contain an XML external entity (XXE) injection vulnerability (CWE-611). When a user opens a specially crafted file, the application parses the XML and sends local file data to a remote server controlled by the attacker. This results in loss of confidentiality—sensitive engineering data, configurations, or credentials stored on the workstation could be exposed. The vulnerability is exploitable only through local file interaction; it is not remotely exploitable and requires user action to open a malicious file.
- User must open a malicious file with Connected Component Workbench, ISaGRAF Workbench, or Safety Instrumented Systems Workstation
- File must be crafted to trigger the XML external entity (XXE) vulnerability during parsing
- Attacker must be able to deliver the malicious file to the target user (e.g., via email or removable media)
- The workstation must have network connectivity to reach the attacker's remote server
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ed8e110e-5681-4c45-bfa8-30904ed7a7d6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.