CVE-2024-37367

7.5 HIGH

📋 TL;DR

An authentication bypass vulnerability in Rockwell Automation FactoryTalk View SE v12 allows remote users to access HMI projects without proper authentication. This affects industrial control systems using FactoryTalk View SE v12. Attackers can view sensitive HMI project data that should require authentication.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: Version 12.00.00 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with FactoryTalk View SE installed and configured for remote access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to HMI projects, potentially learning system layouts, control logic, and sensitive operational data that could facilitate further attacks on industrial processes.

🟠

Likely Case

Unauthorized viewing of HMI project files containing system configurations, control logic, and operational parameters that could be used for reconnaissance or planning targeted attacks.

🟢

If Mitigated

Limited to information disclosure only if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability requires network access to FactoryTalk View SE server but no authentication credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 12.00.01 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1675.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View SE v12.00.01 or later from Rockwell Automation website. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the system.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to FactoryTalk View SE servers to only authorized systems

Firewall Rules

all

Implement strict firewall rules to block unauthorized access to FactoryTalk View SE ports

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FactoryTalk View SE systems from untrusted networks
  • Deploy intrusion detection systems to monitor for unauthorized access attempts to FactoryTalk View SE services

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View SE version in Control Panel > Programs and Features. If version is 12.00.00 or earlier, system is vulnerable.

Check Version:

wmic product where name like "FactoryTalk View SE%" get version

Verify Fix Applied:

Verify version is 12.00.01 or later in Control Panel > Programs and Features. Test that unauthorized users cannot access HMI projects.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to FactoryTalk View SE services
  • Failed authentication logs followed by successful project access

Network Indicators:

  • Unexpected connections to FactoryTalk View SE ports from unauthorized IP addresses
  • Unusual traffic patterns to FactoryTalk SE services

SIEM Query:

source="FactoryTalk" AND (event_type="access" OR event_type="authentication") AND result="success" AND user="unknown"

🔗 References

📤 Share & Export