Rockwell Automation FactoryTalk View Site Edition (Update A)
FactoryTalk View Site Edition version 13.0 has a local privilege escalation vulnerability caused by overly permissive default Windows folder permissions on the HMI projects directory. Any user with local access to the HMI server can edit or replace project files in the default folder (C:\Users\Public\Documents\RSView Enterprise\SE\HMI projects). When the HMI server loads or executes these files, the changes run with the elevated permissions of the account that executes the projects, allowing attackers to alter process logic, setpoints, or disable safety functions. The vulnerability is not remotely exploitable but affects organizations that do not restrict local access to HMI servers or have not hardened folder permissions.
- Local user account on the HMI server computer
- Access to the default HMI projects folder path
- Elevated privilege account that executes the HMI projects (already configured on the server)
/api/v1/advisories/ece251ea-3bba-4410-aaed-38219c0719a8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.