ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools
ISaGRAF Workbench and ISaGRAF Runtime contain multiple vulnerabilities allowing unauthorized access, privilege escalation, and remote code execution. ISaGRAF is embedded in programming tools and embedded controllers from Rockwell Automation and Schneider Electric used to create and execute IEC 61131-3 control logic on RTUs and industrial devices. Successful exploitation could allow an attacker to execute arbitrary actions on affected devices, including accessing sensitive information, elevating privileges, and running remote code that alters process control behavior. Multiple Schneider Electric and Rockwell Automation products embedding ISaGRAF are affected. Some products will not receive patches.
- High-level user account on engineering workstation or RTU with ISaGRAF Runtime enabled
- Network access to ISaGRAF ETCP ports 1131 and 1113 (typically restricted to engineering subnets)
- ISaGRAF must be configured and running on the affected device
- For some products, physical access to install updated firmware
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4bc6e7b1-75ec-4338-be75-74a0b38e78fa