CVE-2023-2778

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in Rockwell Automation FactoryTalk Transaction Manager allows attackers to crash the application or cause high resource consumption by sending specially crafted packets to port 400. This affects organizations using FactoryTalk Transaction Manager in industrial control environments. The application requires restart to recover from the DoS condition.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk Transaction Manager
Versions: All versions prior to 2.31.00
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: FactoryTalk Transaction Manager typically runs on Windows systems in industrial control environments. Port 400 is the default transaction manager port.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash requiring manual restart, disrupting industrial operations that depend on FactoryTalk Transaction Manager for data exchange between systems.

🟠

Likely Case

Intermittent application functionality issues with high CPU/memory usage, causing performance degradation in industrial data transactions.

🟢

If Mitigated

No impact if network controls prevent access to port 400 or if the vulnerability is patched.

🌐 Internet-Facing: MEDIUM - While industrial systems shouldn't be internet-facing, misconfigurations could expose this port. Exploitation requires network access to port 400.
🏢 Internal Only: HIGH - Within industrial networks, attackers with internal access could disrupt critical manufacturing/process operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a modified packet to port 400 - no authentication needed. The specific packet structure hasn't been publicly disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.31.00

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139744

Restart Required: Yes

Instructions:

1. Download FactoryTalk Transaction Manager version 2.31.00 from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the application/service.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict access to port 400/TCP using firewall rules to only trusted systems

Windows Firewall: New-NetFirewallRule -DisplayName "Block FactoryTalk Port 400" -Direction Inbound -LocalPort 400 -Protocol TCP -Action Block

Port Change

windows

Change the default port from 400 to a non-standard port if supported by configuration

Modify FactoryTalk Transaction Manager configuration file to use alternative port

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FactoryTalk Transaction Manager from untrusted networks
  • Deploy intrusion detection systems to monitor for anomalous traffic on port 400

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk Transaction Manager version - if below 2.31.00, system is vulnerable. Verify port 400 is listening: netstat -an | findstr :400

Check Version:

Check FactoryTalk Transaction Manager About dialog or installation directory version information

Verify Fix Applied:

Confirm version is 2.31.00 or higher. Test that application remains responsive when receiving traffic on port 400.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • High CPU/memory usage alerts
  • Service restart events in Windows Event Log

Network Indicators:

  • Unusual traffic patterns to port 400
  • Malformed packets to port 400
  • Connection attempts from unexpected sources

SIEM Query:

source="windows" event_id=1000 OR event_id=1001 process_name="FactoryTalk*" OR destination_port=400 AND packet_size>normal

🔗 References

📤 Share & Export