Rockwell Automation Lifecycle Services with VMware
Vulnerabilities in Rockwell Automation Lifecycle Services and related products running on VMware infrastructure (including Industrial Data Center, VersaVirtual Appliance, Engineered and Integrated Solutions, Threat Detection Managed Services, and Endpoint Protection Service) allow local code execution or memory leakage through buffer overflow and memory handling issues in vSocket communication. Successful exploitation requires local access to the VMware host and could allow an attacker to run code with elevated privileges or extract sensitive data from memory. All versions of these products are affected. VMware vSphere is the underlying cause; Broadcom has released patches for ESXi 8.0u3f, 8.0u2e, and 7.0u3w.
- Local user access to the VMware host running Rockwell Automation services (console, SSH, RDP, or other local shell)
- The affected Rockwell Automation service or VMware vSocket communication path must be active
Patching may require device reboot — plan for process interruption
/api/v1/advisories/dab6c567-5afa-4e02-a9fd-fe39f1c5403dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.