CVE-2024-21915

9.0 CRITICAL

📋 TL;DR

A privilege escalation vulnerability in Rockwell Automation FactoryTalk Service Platform allows authenticated users with basic privileges to gain administrator access. This affects all organizations using vulnerable versions of FTSP, potentially compromising industrial control systems.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk Service Platform
Versions: Versions 6.11.0 and 6.12.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing threat actors to modify critical industrial processes, delete operational data, and render the FTSP system unavailable, potentially causing operational disruption or safety incidents.

🟠

Likely Case

Unauthorized administrative access leading to data theft, configuration changes, and potential disruption of FactoryTalk services affecting connected industrial systems.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and monitoring are implemented to detect privilege escalation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but basic privileges are sufficient. The vulnerability is in the authentication mechanism itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.13.0

Vendor Advisory: https://www.rockwellautomation.com/en-us/support/advisory.SD1662.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk Service Platform version 6.13.0 from Rockwell Automation Product Compatibility and Download Center. 2. Backup current configuration. 3. Run the installer to upgrade. 4. Restart the system as prompted.

🔧 Temporary Workarounds

Restrict User Access

all

Limit user accounts to only essential personnel and implement strict access controls

Network Segmentation

all

Isolate FTSP systems from general network access and implement firewall rules

🧯 If You Can't Patch

  • Implement strict monitoring of authentication logs for privilege escalation attempts
  • Apply additional authentication controls and review all user permissions regularly

🔍 How to Verify

Check if Vulnerable:

Check FTSP version in Control Panel > Programs and Features. Vulnerable if version is 6.11.0 or 6.12.0.

Check Version:

Not applicable - check via Windows Control Panel or FTSP interface

Verify Fix Applied:

Verify version shows 6.13.0 or higher after patching and test that basic users cannot gain administrative privileges.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • User accounts gaining administrative access unexpectedly
  • Authentication anomalies in FTSP logs

Network Indicators:

  • Unusual administrative access patterns from non-admin user accounts
  • Authentication requests to FTSP from unexpected sources

SIEM Query:

source="FTSP" AND (event_type="privilege_escalation" OR user_group_change="Administrator")

🔗 References

📤 Share & Export