Rockwell Automation FactoryTalk Optix
A vulnerability in Rockwell Automation FactoryTalk Optix (versions 1.5.0 through 1.5.7) allows remote code execution due to insufficient input validation. An attacker with local network access and valid user credentials could exploit this flaw to execute arbitrary commands on affected HMI/SCADA visualization systems. FactoryTalk Optix Remote (all versions) is also affected but will not receive a vendor patch. Rockwell Automation recommends updating to version 1.6.0 or later for FactoryTalk Optix. No public exploitation has been reported.
- Network access to the FactoryTalk Optix application from an internal network segment
- Valid user credentials to authenticate to FactoryTalk Optix or the Optix Runtime environment
- User interaction required (user action or social engineering to trigger the malicious input)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3b5e7a0a-394f-448b-9df1-242c10972c5dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.