CVE-2023-2072

8.8 HIGH

📋 TL;DR

Rockwell Automation PowerMonitor 1000 has stored cross-site scripting vulnerabilities in publicly accessible web pages. Attackers can inject malicious code that executes when authenticated users view those pages, potentially leading to remote code execution. This affects all PowerMonitor 1000 users with vulnerable versions.

💻 Affected Systems

Products:
  • Rockwell Automation PowerMonitor 1000
Versions: All versions prior to 4.004
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web interface component of PowerMonitor 1000 devices. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary code, steal credentials, manipulate device operations, and disrupt industrial processes.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized access to device configuration and monitoring data.

🟢

If Mitigated

Limited to client-side script execution if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH - Vulnerable pages are accessible without authentication and can be exploited remotely.
🏢 Internal Only: HIGH - Even internally, attackers can exploit this to compromise authenticated users and gain elevated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attackers can inject payloads without authentication, but exploitation requires authenticated user interaction. Stored XSS makes exploitation reliable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.004

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761

Restart Required: Yes

Instructions:

1. Download firmware version 4.004 from Rockwell Automation support portal. 2. Backup current configuration. 3. Apply firmware update following manufacturer instructions. 4. Restart device. 5. Verify successful update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PowerMonitor 1000 devices from untrusted networks and limit access to authorized users only.

Web Interface Restriction

all

Restrict web interface access to specific IP addresses using firewall rules.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding at network perimeter
  • Monitor for suspicious web requests and JavaScript payloads in device logs

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console. Versions below 4.004 are vulnerable.

Check Version:

Check via web interface: Login > System > About, or via serial console using manufacturer-specific commands.

Verify Fix Applied:

Confirm firmware version shows 4.004 or higher in device settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript or HTML payloads in web request logs
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Suspicious HTTP POST requests with encoded payloads to device web pages
  • Unexpected outbound connections from device

SIEM Query:

source="powermonitor" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:" OR http_request CONTAINS "onerror=" OR http_request CONTAINS "onload=")

🔗 References

📤 Share & Export