Automation Runtime and mapp View Use of insecure algorithm for self-signed certificates
Plan Patch7.5sa25p001Jan 15, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
B&R Automation Runtime and mapp View versions prior to 6.1 use an insecure algorithm for generating self-signed certificates. An attacker who successfully exploits this vulnerability may impersonate services on affected devices by forging certificates with the same weak algorithm. This vulnerability applies to systems that generate self-signed certificates on production machines.
What this means
What could happen
An attacker could impersonate legitimate services (such as web interfaces or engineering interfaces) on affected devices by forging self-signed certificates, potentially enabling credential theft or malicious configuration changes.
Who's at risk
Industrial automation operators using B&R Automation Runtime or mapp View for engineering workstations, PLCs, or process automation systems should prioritize this update, especially if these systems generate self-signed certificates for securing engineering interfaces or inter-device communication in production environments.
How it could be exploited
An attacker on the network intercepts or observes the weak self-signed certificate generation process used by Automation Runtime or mapp View. The attacker then crafts a forged certificate with the same weak algorithm to impersonate a trusted service, intercepting traffic or deceiving operators into trusting a malicious interface.
Prerequisites
- Network access to B&R Automation Runtime or mapp View instance
- Target device must be generating self-signed certificates using the vulnerable versions
- Attacker must be positioned to intercept or observe certificate traffic or operator connections
remotely exploitableno authentication requiredlow complexityaffects service integrity and trust boundaries
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
Automation Runtime < 6.1<6.16.1
mapp View < 6.1<6.16.1
Remediation & Mitigation
0/4
Do now
0/1HARDENINGRestrict network access to certificate management interfaces and B&R service ports using firewall rules
Schedule — requires maintenance window
0/3Patching may require device reboot — plan for process interruption
HOTFIXUpdate B&R Automation Runtime to version 6.1 or later
HOTFIXUpdate B&R mapp View to version 6.1 or later
HARDENINGReview and regenerate any existing self-signed certificates generated by vulnerable versions using the updated software
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/f6485d4e-6481-40e4-936f-b9d15006dbe6