Danger Alert: Remote Exploit Threat in Rockwell Automation Systems!

View CSAF: Rockwell Automation’s FactoryTalk Historian ThingWorx has a vulnerability rated CVSS v4 9.3, which could let attackers remotely exploit XML external entities. The good news? A product update is available. The bad news? You might want to update those firewalls and VPNs while you’re at it. Stay secure, folks!

Pro Dashboard

Hot Take:

In the latest installment of “Oops, We Did It Again,” we take a look at Rockwell Automation’s precarious dance with XML external entities. It seems like their FactoryTalk Historian ThingWorx has been moonlighting as a potential security breach, thanks to an oversight that could allow hackers an all-access pass to your systems. But don’t worry, Rockwell Automation swears they’ve got the antidote in the form of a shiny new update. Just don’t forget to turn off your Internet connection while you’re at it!

Key Points:

– Rockwell Automation’s FactoryTalk Historian ThingWorx has a vulnerability due to improper restriction of XML external entities.
– The affected product version is 95057C-FTHTWXCT11, versions v4.02.00 and prior.
– This vulnerability allows XXE-based attacks when using Apache log4net versions before 2.0.10.
– A CVSS v4 score of 9.3 makes this a high-severity issue.
– Rockwell Automation has released an update to mitigate the vulnerability.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?