CVE-2023-29030

7.0 HIGH

📋 TL;DR

A cross-site scripting (XSS) vulnerability in Rockwell Automation's ArmorStart ST product allows attackers to inject malicious scripts into web pages. This could enable viewing or modifying sensitive data or causing denial of service. Users of ArmorStart ST products with web interfaces are affected.

💻 Affected Systems

Products:
  • Rockwell Automation ArmorStart ST
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions.
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (e.g., clicking a malicious link) and affects the web interface of the device.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal credentials, manipulate device configurations, or render the web interface unusable, potentially disrupting industrial operations.

🟠

Likely Case

Attackers could steal session cookies or credentials through phishing, gaining unauthorized access to the device's web interface.

🟢

If Mitigated

With proper network segmentation and user awareness, impact is limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction via phishing or similar social engineering, making it dependent on human factors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions.

Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438

Restart Required: Yes

Instructions:

1. Review the vendor advisory for affected versions and patches. 2. Apply the recommended firmware update from Rockwell Automation. 3. Restart the device as required after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ArmorStart ST devices from untrusted networks and limit access to authorized users only.

User Awareness Training

all

Educate users to avoid clicking suspicious links and to verify URLs when accessing device interfaces.

🧯 If You Can't Patch

  • Implement strict network access controls to prevent external access to the device's web interface.
  • Monitor for unusual web traffic or phishing attempts targeting users with access to the device.

🔍 How to Verify

Check if Vulnerable:

Check the device firmware version against the vendor advisory to see if it falls within affected ranges.

Check Version:

Consult device documentation or web interface for firmware version information; specific commands vary by device model.

Verify Fix Applied:

After patching, verify the firmware version matches the patched version listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web requests to the device's interface, especially with script-like payloads in parameters.

Network Indicators:

  • HTTP requests with suspicious parameters or unexpected redirects to the device's IP.

SIEM Query:

Example: 'source_ip=* AND dest_ip=<device_ip> AND (http_uri CONTAINS "script" OR http_query CONTAINS "<" OR http_query CONTAINS ">")'

🔗 References

📤 Share & Export