CVE-2024-21917

9.8 CRITICAL

📋 TL;DR

This vulnerability in Rockwell Automation FactoryTalk Service Platform allows attackers to steal service tokens and use them to authenticate to other FTSP directories without proper validation. This enables unauthorized access to user information and system settings modification. Organizations using affected FactoryTalk Service Platform versions are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk Service Platform
Versions: Versions 6.11.00 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability affects the token validation mechanism between FTSP components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of FactoryTalk Service Platform environment allowing attackers to modify critical industrial control system configurations, steal sensitive operational data, and potentially disrupt manufacturing processes.

🟠

Likely Case

Unauthorized access to user information and system settings, potentially leading to data theft, configuration changes, and privilege escalation within the FactoryTalk ecosystem.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to detect token misuse attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial access to the system but token theft and reuse is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.12.00 and later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1660.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk Service Platform version 6.12.00 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected systems. 5. Verify proper functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FactoryTalk Service Platform systems from untrusted networks and implement strict access controls.

Enhanced Monitoring

all

Implement logging and monitoring for unusual token usage patterns and authentication attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FactoryTalk systems from other networks
  • Deploy enhanced monitoring and alerting for suspicious authentication patterns and token usage

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk Service Platform version via Control Panel > Programs and Features or using vendor-provided version checking tools.

Check Version:

Check Windows Programs and Features or use Rockwell Automation diagnostic tools

Verify Fix Applied:

Verify installed version is 6.12.00 or later and test token validation between FTSP components.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts with same token from different sources
  • Unusual token generation patterns
  • Authentication failures followed by successful access

Network Indicators:

  • Unexpected cross-directory authentication traffic
  • Token reuse across different FTSP endpoints

SIEM Query:

source="FactoryTalk" AND (event_type="authentication" AND token_reuse=true) OR (source_ip!=dest_ip AND same_token)

🔗 References

📤 Share & Export