Trimble Cityworks (Update A)
Trimble Cityworks contains a remote code execution vulnerability (CWE-502) affecting versions prior to 15.8.9 and 23.10. An authenticated user with administrative privileges can exploit this to execute arbitrary code on the Cityworks server. The vulnerability is actively being exploited in the wild. Trimble has released patch versions 15.8.9 (January 28, 2025) and 23.10 (January 29, 2025). Additionally, some on-premise deployments have been identified running IIS with local or domain administrative privileges, which increases the severity of successful exploitation. Attachment directory configurations may also be misconfigured in some deployments.
- Administrative credentials on Cityworks system (valid utility staff account or service account)
- Network access to Cityworks server on port 443 (HTTPS)
- IIS application identity configured with local or domain administrative privileges (required only if attacker intends to escape application sandbox; standard non-admin config provides some containment)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/247e9bb0-9576-4c05-a19f-ceae038166eeGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.