Rockwell Automation FactoryTalk Activation Manager
A vulnerability in FactoryTalk Activation Manager version 5.00 allows an unauthenticated remote attacker to expose sensitive data (licensing information, authentication tokens) and potentially hijack sessions. The vulnerability is caused by a flaw in session or data handling (CWE-303: Use of Insufficiently Random Values). Successful exploitation could compromise control system access management and enable unauthorized access to FactoryTalk-managed environments. Version 5.02 and later contain the fix; some older versions may not receive patches.
- Network access to FactoryTalk Activation Manager (typically port 443)
- Running FactoryTalk Activation Manager version 5.00 or other affected versions
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f96b0c03-ca82-42c8-97a8-94346d745f2bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.