CVE-2023-2444

7.1 HIGH

📋 TL;DR

This CSRF vulnerability in Rockwell Automation's FactoryTalk Vantagepoint allows attackers to trick authenticated users into performing unauthorized actions. Attackers can exploit it by sending malicious links to users on the same domain or by combining it with credential entry. All users of affected FactoryTalk Vantagepoint versions are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk Vantagepoint
Versions: All versions prior to the patched version (specific version not provided in references)
Operating Systems: Windows (presumed based on FactoryTalk products)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in default configurations. Requires user interaction with malicious links while authenticated or after authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers can perform any action as the victim user, including configuration changes, data manipulation, or system disruption in industrial environments.

🟠

Likely Case

Unauthorized actions performed in the victim's context, potentially leading to data modification, configuration changes, or operational impact in industrial control systems.

🟢

If Mitigated

Limited impact with proper CSRF protections, network segmentation, and user awareness training preventing successful exploitation.

🌐 Internet-Facing: MEDIUM - Exploitation requires user interaction with malicious links, but combined attacks with credential entry can bypass some protections.
🏢 Internal Only: HIGH - Same-domain attacks are easier to execute and more likely to succeed in internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick users into clicking malicious links. No authentication bypass needed if user is already authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references - check vendor advisory for specific version

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139443

Restart Required: Yes

Instructions:

1. Review Rockwell Automation security advisory. 2. Download and apply the latest patch from Rockwell Automation. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax attributes on session cookies

🧯 If You Can't Patch

  • Implement network segmentation to isolate FactoryTalk Vantagepoint from untrusted networks
  • Deploy web application firewall with CSRF protection rules and conduct user security awareness training

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk Vantagepoint version against vendor advisory. Test for missing CSRF tokens on forms and state-changing requests.

Check Version:

Check within FactoryTalk Vantagepoint application interface or consult system documentation

Verify Fix Applied:

Verify patch installation via version check and test that CSRF protections are implemented on all forms and state-changing endpoints.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected state changes without corresponding user actions
  • Requests missing expected CSRF tokens
  • Multiple failed state-change attempts from same source

Network Indicators:

  • HTTP requests with Referer headers pointing to external domains
  • Unexpected POST requests to FactoryTalk Vantagepoint endpoints

SIEM Query:

source="FactoryTalk Vantagepoint" AND (action="modify" OR action="delete" OR action="create") AND NOT user_action="confirmed"

🔗 References

📤 Share & Export