Rockwell Automation FactoryTalk Service Platform
FactoryTalk Service Platform versions prior to 2.74 contain a privilege escalation vulnerability (CWE-279) that allows a user with basic group privileges to escalate to administrator-level access. Successful exploitation requires the attacker to have a valid user account on the system and specific system conditions to be present (high attack complexity). No patch is currently available from Rockwell Automation. Rockwell Automation recommends implementing network isolation and access controls as mitigations.
- Valid user account with basic (non-admin) group privileges on FactoryTalk Service Platform
- Network access to the FactoryTalk Service Platform
- Specific system configuration that permits the exploit (high attack complexity suggests certain conditions must be met)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2e473708-e1a5-46e3-ad99-e67a8ee9d43bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.