B&R Industrial Automation Automation Studio 4
B&R Automation Studio 4 contains an input validation flaw in an optional project file upload/backup feature that allows an attacker to execute arbitrary code within the Studio application or on connected PLCs. The vulnerability is triggered when a user opens a specially crafted project file. If the PLC has the project backup feature enabled and communication is not protected with encryption and strong authentication, an attacker could execute commands on the PLC itself. This feature is not activated by default. The vulnerability affects all versions of Automation Studio 4 with no vendor patch planned.
- Automation Studio 4 must be running on an engineer's workstation
- User must open a malicious project file (social engineering required)
- Optional 'Backing up project source files on the target system' feature must be enabled on the target PLC
- ANSL communication must be unencrypted or SSL/authentication must be disabled
- Network access from the workstation to the PLC (direct or through corporate network)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f8a5c56a-72d6-450e-85ac-280678545d3dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.