CVE-2024-10943

9.1 CRITICAL

📋 TL;DR

This authentication bypass vulnerability allows attackers to impersonate legitimate users by exploiting shared secrets across accounts. Organizations using affected Rockwell Automation products are at risk, particularly those with internet-facing systems or insufficient network segmentation.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: FactoryTalk View SE versions prior to 12.00.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using FactoryTalk authentication with shared secrets across user accounts.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized access to industrial control systems, potential manipulation of physical processes, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive operational data, configuration changes to industrial equipment, and potential disruption of manufacturing processes.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and access controls preventing lateral movement even if initial authentication bypass occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to enumerate additional authentication information beyond just the shared secret vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk View SE version 12.00.02

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1710.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View SE version 12.00.02 from Rockwell Automation support portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart affected systems. 5. Verify installation and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FactoryTalk systems from untrusted networks and implement strict firewall rules

Enhanced Monitoring

all

Implement detailed logging and monitoring for authentication attempts and user activity

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from internet and untrusted networks
  • Enable detailed authentication logging and implement SIEM alerts for suspicious authentication patterns
  • Implement multi-factor authentication where possible and review user account permissions
  • Regularly audit user accounts and remove unnecessary or dormant accounts

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View SE version in Control Panel > Programs and Features. Versions prior to 12.00.02 are vulnerable.

Check Version:

wmic product where name like "FactoryTalk View SE%" get version

Verify Fix Applied:

Verify installed version is 12.00.02 or later and test authentication functionality with various user accounts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from same source
  • Authentication from unusual IP addresses or locations
  • User account accessing resources outside normal patterns

Network Indicators:

  • Unusual authentication traffic patterns
  • Connections from unexpected network segments to FactoryTalk systems

SIEM Query:

source="FactoryTalk" AND (event_type="authentication" AND (result="success" AND previous_hour_result="failure"))

🔗 References

📤 Share & Export