FANUC ROBOGUIDE Simulation Platform
FANUC ROBOGUIDE simulation platform versions 9.40083.00.05 (Rev T) and earlier contain multiple vulnerabilities that could allow denial of service, remote code execution, or unauthorized privilege escalation. The vulnerabilities stem from improper access control (CWE-732, CWE-284), path traversal (CWE-22), XML external entity processing (CWE-611), and resource exhaustion (CWE-400). Successful exploitation requires network access to the workstation and user interaction, such as opening a malicious file. An attacker could execute code with the privileges of the ROBOGUIDE application, potentially altering robot programs or disrupting engineering work.
- Network access to the engineering workstation running ROBOGUIDE
- User interaction required (likely opening a malicious file or project)
- ROBOGUIDE version 9.40083.00.05 (Rev T) or earlier installed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/45f117c3-9e2b-4cd2-8cee-504e47889486Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.