B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM)
B&R Automation Runtime versions prior to 6.4 contain vulnerabilities in the System Diagnostic Manager (SDM) web interface. An attacker with network access to SDM could conduct cross-site scripting (XSS) or session hijacking attacks, allowing them to execute code in the context of a user's browser session or take over an authenticated session. The vulnerabilities are exploitable via reflected XSS and improper random number generation for session tokens. SDM is disabled by default in Automation Runtime 6 but may be enabled by users who require remote diagnostics or maintenance capabilities.
- Network access to the System Diagnostic Manager web interface port
- System Diagnostic Manager (SDM) enabled on the Automation Runtime controller
- A legitimate user actively using the SDM web interface in their browser
Patching may require device reboot — plan for process interruption
/api/v1/advisories/071aabd4-8974-4ec1-8f2f-471c88fe6c9aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.