Rockwell Automation Lifecycle Services with VMware
Multiple Rockwell Automation Lifecycle Services products running on VMware infrastructure contain privilege escalation and memory corruption vulnerabilities (CWE-367, CWE-123, CWE-125) that could allow an attacker with local administrative privileges to execute arbitrary code with full system control. Affected products include Industrial Data Center, VersaVirtual Appliance, Threat Detection Managed Services, Endpoint Protection Service, and Engineered and Integrated Solutions. The vulnerabilities are not remotely exploitable. Rockwell Automation will contact impacted users with remediation guidance; users without managed service contracts should apply VMware patches from Broadcom.
- Local administrative privileges on the VMware hypervisor or the virtual machine hosting an affected Rockwell product
- Physical access to the system or compromised local administrator account
/api/v1/advisories/df3bac28-cee9-44e8-95c7-733d319dc406Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.