Rockwell Automation Pavilion8
Pavilion8 versions 5.20 and later lack encryption for communication between the Console and Dashboard components. This allows an authenticated attacker to intercept and view sensitive data transmitted between these components. The vulnerability is classified as CWE-311 (Missing Encryption of Sensitive Data). Rockwell Automation released version 6.0 to address this issue. As a temporary measure, organizations should restrict physical and network access to affected systems and use firewalls to isolate Pavilion8 from untrusted networks.
- Valid Pavilion8 user credentials (engineering or equivalent account)
- Network access to the machine running Pavilion8 Console and Dashboard, or presence on the same local network segment
- Ability to capture network traffic (e.g., packet sniffer) if communication spans network
- Pavilion8 version 5.20 or later
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fa8bf056-4740-48a1-b57d-2cd7c09b8f2bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.