Emerson ValveLink Products
Emerson ValveLink SOLO, DTM, PRM, and SNAP-ON versions prior to 14.0 contain multiple vulnerabilities (CWE-316, CWE-693, CWE-427, CWE-20) related to cleartext storage of sensitive information, improper restriction of rendered UI layers to a single layer, information exposure through query strings, and insufficient input validation. Successful exploitation could allow an attacker with access to the system to read sensitive information stored in cleartext, tamper with parameters, and run unauthorized code.
- Network access to the workstation running ValveLink software
- Local or network-accessible access to the ValveLink application
- No evidence of requiring valid user credentials for initial exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f17703af-2090-4fae-8531-8c3d1d9b2e29Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.