CVE-2020-5807

7.5 HIGH

📋 TL;DR

An unauthenticated remote attacker can exploit this vulnerability by sending specially crafted data to FactoryTalk Diagnostics on TCP port 5241, causing an unhandled exception when a local user views the malicious log entry in FactoryTalk Diagnostics Viewer. This affects all versions of FactoryTalk Diagnostics 6.11 and earlier, potentially allowing denial of service or arbitrary code execution.

💻 Affected Systems

Products:
  • FactoryTalk Diagnostics
Versions: All versions up to and including 6.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: RsvcHost.exe listens on TCP port 5241 by default. FactoryTalk Diagnostics Viewer (FTDiagViewer.exe) must be used to trigger the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though this requires additional exploitation beyond the documented unhandled exception.

🟠

Likely Case

Denial of service through application crash when a legitimate user attempts to view malicious log entries in FactoryTalk Diagnostics Viewer.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to port 5241.

🌐 Internet-Facing: HIGH if FactoryTalk Diagnostics is exposed to the internet, as exploitation requires no authentication.
🏢 Internal Only: MEDIUM to HIGH depending on network segmentation and attacker access to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending data to port 5241 and a local user opening FactoryTalk Diagnostics Viewer to view the malicious log entry.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk Diagnostics 6.12 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1653.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk Diagnostics 6.12 or later from Rockwell Automation. 2. Install the update following vendor instructions. 3. Restart affected systems.

🔧 Temporary Workarounds

Block TCP port 5241

windows

Use firewall rules to block unauthorized access to TCP port 5241.

netsh advfirewall firewall add rule name="Block FactoryTalk Diagnostics" dir=in action=block protocol=TCP localport=5241

Disable FactoryTalk Diagnostics service

windows

Stop and disable the RsvcHost.exe service if not required.

sc stop "FactoryTalk Diagnostics"
sc config "FactoryTalk Diagnostics" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FactoryTalk Diagnostics systems from untrusted networks.
  • Monitor for unauthorized access attempts to TCP port 5241 and investigate any suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if FactoryTalk Diagnostics version is 6.11 or earlier and if RsvcHost.exe is listening on TCP port 5241.

Check Version:

Check the version in Control Panel > Programs and Features or via the application interface.

Verify Fix Applied:

Verify FactoryTalk Diagnostics version is 6.12 or later and test that malicious log entries no longer cause application crashes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual entries in FactoryTalk Diagnostics event log with long field values
  • Application crashes of FTDiagViewer.exe

Network Indicators:

  • Unauthorized connections to TCP port 5241
  • Unusual traffic patterns to FactoryTalk Diagnostics systems

SIEM Query:

source="FactoryTalk Diagnostics" AND (event_id="Application Error" OR message="*wcscpy_s*" OR message="*unhandled exception*")

🔗 References

📤 Share & Export