CVE-2024-40620

7.5 HIGH

📋 TL;DR

This vulnerability allows unencrypted transmission of sensitive data between Console and Dashboard components in Rockwell Automation products. Attackers monitoring network traffic could intercept confidential information. Organizations using affected Rockwell Automation products are impacted.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View Site Edition
Versions: FactoryTalk View Site Edition versions 13.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Console and Dashboard components communicate without encryption enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of sensitive operational data including credentials, configuration details, and proprietary information to attackers, potentially enabling further system compromise.

🟠

Likely Case

Interception of sensitive data by network-based attackers or malicious insiders, leading to information disclosure and potential credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though data confidentiality remains at risk during transmission.

🌐 Internet-Facing: HIGH if affected systems are internet-facing, as unencrypted traffic could be intercepted by external attackers.
🏢 Internal Only: MEDIUM for internal networks, as attackers would need internal access but could still intercept traffic via network monitoring.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept traffic between Console and Dashboard components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk View Site Edition version 13.0.1 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201691.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View Site Edition version 13.0.1 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected systems.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Console and Dashboard communication to trusted network segments to limit exposure.

VPN/Encrypted Tunnel

all

Route Console-Dashboard traffic through encrypted VPN tunnels.

🧯 If You Can't Patch

  • Implement strict network segmentation between Console and Dashboard components.
  • Deploy network monitoring and intrusion detection systems to detect traffic interception attempts.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View Site Edition version - if running version 13.0 or earlier, system is vulnerable.

Check Version:

Check version in FactoryTalk View Site Edition application or Windows Programs and Features.

Verify Fix Applied:

Verify installation of FactoryTalk View Site Edition version 13.0.1 or later and confirm encrypted communication between Console and Dashboard.

📡 Detection & Monitoring

Log Indicators:

  • Unencrypted traffic logs in proxy servers between Console and Dashboard IPs
  • Network monitoring alerts for cleartext sensitive data transmission

Network Indicators:

  • Cleartext traffic on ports used by FactoryTalk View between Console and Dashboard components
  • Lack of TLS/SSL encryption in Console-Dashboard communications

SIEM Query:

source_ip IN (console_ips) AND dest_ip IN (dashboard_ips) AND protocol=tcp AND NOT (tls_version EXISTS OR ssl_version EXISTS)

🔗 References

📤 Share & Export