CVE-2021-27468

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in Rockwell Automation FactoryTalk AssetCentre allows remote, unauthenticated attackers to execute arbitrary SQL statements via the AosService.rem service. Organizations using FactoryTalk AssetCentre v10.00 and earlier are affected, potentially exposing sensitive industrial control system data and configurations.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk AssetCentre
Versions: v10.00 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The AosService.rem service is exposed by default in affected versions

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the FactoryTalk AssetCentre database, allowing data theft, manipulation, or deletion, potentially leading to operational disruption in industrial environments.

🟠

Likely Case

Unauthorized access to sensitive asset management data, configuration information, and potential lateral movement within the industrial network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the vulnerable service.

🌐 Internet-Facing: HIGH - Direct remote exploitation possible without authentication
🏢 Internal Only: HIGH - Even internally, unauthenticated attackers can exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection via unauthenticated remote service makes exploitation straightforward for attackers with network access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk AssetCentre v11.00 or later

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1130831

Restart Required: Yes

Instructions:

1. Download FactoryTalk AssetCentre v11.00 or later from Rockwell Automation support portal
2. Backup current configuration and database
3. Install the updated version following vendor documentation
4. Restart the system and verify service functionality

🔧 Temporary Workarounds

Network Segmentation and Firewall Rules

windows

Restrict access to the AosService.rem service (typically TCP port 8080) to only authorized management systems

Windows Firewall: New-NetFirewallRule -DisplayName "Block AosService" -Direction Inbound -Protocol TCP -LocalPort 8080 -Action Block

Disable Unnecessary Service

windows

Temporarily disable the AosService.rem service if not required for operations

sc stop AosService
sc config AosService start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FactoryTalk AssetCentre from untrusted networks
  • Deploy application-level firewalls or WAFs with SQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk AssetCentre version via Control Panel > Programs and Features, or run: wmic product where "name like 'FactoryTalk AssetCentre%'" get version

Check Version:

wmic product where "name like 'FactoryTalk AssetCentre%'" get version

Verify Fix Applied:

Verify version is v11.00 or later and test that AosService.rem requires proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Failed authentication attempts to AosService.rem
  • Unexpected remote connections to port 8080

Network Indicators:

  • SQL injection patterns in traffic to port 8080
  • Unusual database query volume from AssetCentre server

SIEM Query:

source="FactoryTalk" AND (event_id="SQL_INJECTION" OR port=8080 AND protocol="TCP" AND src_ip NOT IN [authorized_ips])

🔗 References

📤 Share & Export