Rockwell Automation Lifecycle Services with VMware
Rockwell Automation products running on VMware ESXi contain multiple memory corruption vulnerabilities (race conditions and out-of-bounds memory access). These affect Industrial Data Center (Generations 1-4), VersaVirtual Appliance (Series A and B), Threat Detection Managed Services, Endpoint Protection Service with RA Proxy, and Engineered and Integrated Solutions—all versions when hosted on vulnerable VMware versions. Exploitation requires local administrative privileges on the hypervisor but could lead to code execution and compromise of all hosted services and virtual machines. Rockwell Automation states it will contact impacted users; non-contracted users should address the underlying VMware vulnerabilities by upgrading ESXi to patched versions (7.0U3s, 8.0U2d, or 8.0U3d).
- Local administrative privileges on the VMware ESXi host or hypervisor
- Physical or remote console access to the host system
- Rockwell Automation services hosted on affected VMware versions (ESXi 7.0 or 8.0 prior to patch levels 7.0U3s or 8.0U2d/8.0U3d)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/df3bac28-cee9-44e8-95c7-733d319dc406