CVE-2021-42536
📋 TL;DR
CVE-2021-42536 allows unauthorized users to read sensitive global variables containing peer username and password credentials. This affects systems running vulnerable versions of the affected product where improper access controls expose these variables to all authenticated users.
💻 Affected Systems
- Rockwell Automation FactoryTalk Linx
📦 What is this software?
Wireless 1410d Gateway Firmware by Emerson
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative credentials leading to complete system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Unauthorized users access sensitive credentials, potentially compromising peer systems and exposing authentication information.
If Mitigated
Limited exposure with proper access controls preventing unauthorized variable access, reducing risk to credential disclosure only.
🎯 Exploit Status
Exploitation requires authenticated access but minimal technical skill to read exposed variables.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: FactoryTalk Linx version 6.11
Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1133605
Restart Required: Yes
Instructions:
1. Download FactoryTalk Linx version 6.11 from Rockwell Automation website. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected systems.
🔧 Temporary Workarounds
Restrict User Access
allLimit user accounts to only those requiring access to FactoryTalk Linx components.
Network Segmentation
allIsolate FactoryTalk Linx systems from untrusted networks and users.
🧯 If You Can't Patch
- Implement strict access controls and least privilege principles for all user accounts
- Monitor and audit access to FactoryTalk Linx systems for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check FactoryTalk Linx version in Control Panel > Programs and Features. If version is below 6.11, system is vulnerable.
Check Version:
wmic product where name like "FactoryTalk Linx%" get version
Verify Fix Applied:
Verify version is 6.11 or higher in Control Panel > Programs and Features.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful access
- Unauthorized user accounts accessing FactoryTalk Linx services
Network Indicators:
- Unusual network traffic patterns to/from FactoryTalk Linx systems
- Credential harvesting attempts
SIEM Query:
source="FactoryTalk" AND (event_type="authentication" OR event_type="access_control") AND result="success" AND user NOT IN [authorized_users]