CVE-2024-37365

7.3 HIGH

📋 TL;DR

This CVE describes a remote code execution vulnerability in Rockwell Automation products where users can save projects to a public directory, allowing local file modification/deletion. Attackers could exploit this to escalate privileges and execute arbitrary code via macro manipulation. Organizations using affected Rockwell Automation software are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View Site Edition
Versions: Versions prior to 13.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FactoryTalk View Site Edition installation with project saving functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, executing arbitrary code, and potentially pivoting to other systems in the network.

🟠

Likely Case

Unauthorized file modification or deletion in public directories, potential privilege escalation within the affected application.

🟢

If Mitigated

Limited to local file access within the public directory scope if proper access controls are implemented.

🌐 Internet-Facing: MEDIUM - While primarily a local access vulnerability, if the affected system is internet-facing, it could be combined with other vulnerabilities for remote exploitation.
🏢 Internal Only: HIGH - The vulnerability requires local access, making internal systems with affected software particularly vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system and knowledge of the vulnerable directory structure. Privilege escalation through macro manipulation adds complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 13.0.1 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1709.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View Site Edition version 13.0.1 or later from Rockwell Automation. 2. Backup existing projects and configurations. 3. Run the installer with administrative privileges. 4. Follow installation wizard prompts. 5. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict Public Directory Permissions

windows

Modify file system permissions to prevent unauthorized access to the public project directory.

icacls "C:\ProgramData\Rockwell Automation\FactoryTalk View SE\Projects\Public" /deny Users:(OI)(CI)F
icacls "C:\ProgramData\Rockwell Automation\FactoryTalk View SE\Projects\Public" /grant Administrators:(OI)(CI)F

Disable Project Saving to Public Directory

windows

Configure application settings to prevent users from saving projects to the vulnerable public directory.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the affected systems.
  • Monitor file system changes in the public project directory for unauthorized modifications.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View Site Edition version in Control Panel > Programs and Features. If version is below 13.0.1, the system is vulnerable.

Check Version:

wmic product where "name like 'FactoryTalk View Site Edition%'" get version

Verify Fix Applied:

Verify version is 13.0.1 or higher in Control Panel > Programs and Features, and test that project saving to public directory is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file modifications in FactoryTalk View project directories
  • Failed permission attempts to public project directory
  • Unexpected macro execution events

Network Indicators:

  • Unusual network connections from FactoryTalk View processes
  • Lateral movement attempts from affected systems

SIEM Query:

EventID=4663 AND ObjectName LIKE '%FactoryTalk View SE%Projects%Public%' AND AccessMask=0x100

🔗 References

📤 Share & Export