CVE-2021-32960

8.5 HIGH

📋 TL;DR

CVE-2021-32960 is an authentication bypass vulnerability in Rockwell Automation FactoryTalk Services Platform that allows authenticated remote attackers to bypass FactoryTalk Security policies based on computer names. This could grant attackers the same privileges as if they were logged onto the client machine. Affected systems include FactoryTalk Services Platform v6.11 and earlier with FactoryTalk Security enabled and deployed.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk Services Platform
Versions: v6.11 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FactoryTalk Security to be enabled and deployed. FactoryTalk Services Platform is typically used in industrial control system environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over industrial control systems, potentially allowing disruption of operations, data theft, or physical damage to industrial processes.

🟠

Likely Case

An authenticated attacker elevates privileges to access restricted systems, modify configurations, or exfiltrate sensitive industrial data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is considered low complexity once authentication is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk Services Platform v6.12 or later

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785

Restart Required: Yes

Instructions:

1. Download FactoryTalk Services Platform v6.12 or later from Rockwell Automation. 2. Follow Rockwell Automation's upgrade procedures. 3. Restart affected systems after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FactoryTalk Services Platform systems from untrusted networks and implement strict access controls.

Disable FactoryTalk Security

windows

Temporarily disable FactoryTalk Security if not required, though this reduces overall security.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks.
  • Enforce least privilege access controls and monitor for unusual authentication patterns.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk Services Platform version in Control Panel > Programs and Features. If version is 6.11 or earlier and FactoryTalk Security is enabled, the system is vulnerable.

Check Version:

wmic product where name like "FactoryTalk Services Platform" get version

Verify Fix Applied:

Verify FactoryTalk Services Platform version is 6.12 or later in Control Panel > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected computer names
  • Access to restricted resources by users with unexpected privileges

Network Indicators:

  • Unexpected network traffic to FactoryTalk Services Platform ports (typically 4000-4002)
  • Authentication requests from unauthorized systems

SIEM Query:

source="FactoryTalk" AND (event_id=4624 OR event_id=4625) AND computer_name NOT IN (allowed_computer_list)

🔗 References

📤 Share & Export