Rockwell Automation FactoryTalk Vantagepoint
FactoryTalk Vantagepoint versions prior to 8.40 contain an authentication and session management vulnerability (CWE-345) that allows an attacker to impersonate an existing user or perform unauthorized actions via a cross-site request forgery (CSRF) attack. Exploitation requires the user to click a malicious link while authenticated to the application. The vulnerability has high attack complexity and no known public exploits. Rockwell Automation recommends updating to version 8.40 or later and implementing security best practices including user training on phishing and social engineering.
- User must click on attacker-controlled link or visit attacker-controlled page
- User must be authenticated to FactoryTalk Vantagepoint at the time of attack
- FactoryTalk Vantagepoint must be accessible via web browser
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ed1d6b36-d7b5-41f2-9898-8c9853d2681bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.