Brief

Summary:

A vulnerability has been discovered in Rockwell Automation's FactoryTalk View Machine Edition, which affects versions v12.0 and v13.0. The vulnerability, designated as CVE-2023-2071, allows an unauthenticated attacker to execute malicious code on the device. The vulnerability is rated 9.8 on the CVSS v3 scale and affects critical infrastructure sectors worldwide. To mitigate this vulnerability, Rockwell recommends updating to the latest firmware versions and implementing security best practices. CISA recommends users minimize network exposure, locate control systems behind firewalls, and use secure remote access methods. Additional mitigation guidance and recommended practices are available on the CISA website. As of the update history, no public exploitation of this vulnerability has been reported.

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 9.8
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: FactoryTalk View Machine Edition
  • Vulnerability: Improper Input Validation

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to execute code remotely with specially crafted malicious packets or by using a self-made library to bypass security checks.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Rockwell Automation products are affected:

  • FactoryTalk View Machine Edition: v13.0
  • FactoryTalk View Machine Edition: v12.0 and prior

3.2 Vulnerability Overview

3.2.1 Improper Input Validation CWE-20

FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, through a CIP class, to execute exported functions from libraries. There is a routine that restricts it to execute specific functions from two dynamic link library files. By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

CVE-2023-2071 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER

Yuval Gordon, CPS Research, and the Microsoft Threat Intelligence Community reported this vulnerability to Rockwell Automation.

4. MITIGATIONS

Rockwell recommends updating FactoryTalk View Machine Edition with v12.0 & v13.0 patch

Users of the affected versions are encouraged by Rockwell Automation to upgrade to corrected firmware revisions. Users are also strongly encouraged to implement Rockwell Automation’s suggested security best practices to minimize the risk of the vulnerability.

For more information and to see Rockwell’s detection rules, see Rockwell Automation’s Security Advisory.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.

5. UPDATE HISTORY

September 21, 2023: Initial Publication

Highlights content goes here...

Summary Report

Executive Summary:

A critical vulnerability has been identified in Rockwell Automation’s FactoryTalk View Machine Edition, affecting versions v13.0 and prior. The vulnerability, rated CVSS v3 9.8, allows an attacker to remotely execute code with specially crafted malicious packets or by uploading a self-made library. The vulnerability is exploitable over the network and has a low attack complexity.

Risk Evaluation:

Successful exploitation of this vulnerability could allow an attacker to execute code remotely, compromising the security of the affected devices. This highlights the importance of prompt action to address this vulnerability.

Technical Details:

The vulnerability affects the PanelView Plus, which improperly verifies user input, allowing unauthorized attackers to execute code. The vulnerability is attributed to improper input validation, specifically CWE-20.

Affected Products:

The following Rockwell Automation products are affected:

FactoryTalk View Machine Edition: v13.0
FactoryTalk View Machine Edition: v12.0 and prior

Mitigations:

The recommended mitigation is to update FactoryTalk View Machine Edition to v12.0 and v13.0 patch, and implement security best practices to minimize the risk of exploitation. Additional guidance is provided by Rockwell Automation and the Cybersecurity and Infrastructure Security Agency (CISA).

Recommendations:

The report emphasizes the importance of proper risk assessment and impact analysis prior to deploying defensive measures. It also recommends implementing recommended cybersecurity strategies for proactive defense of Industrial Control Systems (ICS) assets.

Update History:

The vulnerability was initially published on September 21, 2023.

This summary provides an in-depth overview of the identified vulnerability, risks, and mitigation strategies to help stakeholders take prompt and effective action to protect their devices and networks.

Cybersecurity and Infrastructure Security Agency

Quick Insight
RADA.AI
RADA.AI
Hello! I'm RADA.AI - Regulatory Analysis and Decision Assistance. Your Intelligent guide for compliance and decision-making. How can i assist you today?
Suggested

Form successfully submitted. One of our GRI rep will contact you shortly

Thanking You!

Enter your Email

Enter your registered username/email id.

Enter your Email

Enter your email id below to signup.

Enter your Email

Enter your email id below to signup.
Individual Plan
$125 / month OR $1250 / year
Features
Best for: Researchers, Legal professionals, Academics
Enterprise Plan
Contact for Pricing
Features
Best for: Law Firms, Corporations, Government Bodies