CVE-2024-7513

8.8 HIGH

📋 TL;DR

CVE-2024-7513 is a critical code execution vulnerability in Rockwell Automation products caused by improper default file permissions. Any user can edit or replace files that are executed with elevated privileges, potentially leading to full system compromise. This affects Rockwell Automation FactoryTalk View SE and other industrial control system software.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: Versions prior to 12.00.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with FactoryTalk View SE installed with default permissions. Industrial control systems using this software are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining elevated privileges, executing arbitrary code, and potentially taking control of industrial processes.

🟠

Likely Case

Unauthorized users gaining elevated privileges to modify system files, install malware, or disrupt operations.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place, potentially only file modification without execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once access is obtained due to improper permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk View SE version 12.00.02 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201688.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View SE version 12.00.02 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected systems. 5. Verify proper installation and functionality.

🔧 Temporary Workarounds

Restrict File Permissions

windows

Manually adjust file permissions to prevent unauthorized users from modifying critical files.

icacls "C:\Program Files\Rockwell Software\FactoryTalk View\*" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

Implement Least Privilege Access

all

Ensure users only have necessary permissions and separate administrative accounts from regular user accounts.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized file modifications.
  • Isolate affected systems from network and implement application whitelisting.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View SE version via Control Panel > Programs and Features. If version is below 12.00.02, system is vulnerable.

Check Version:

wmic product where "name like 'FactoryTalk View%'" get version

Verify Fix Applied:

Verify version is 12.00.02 or higher and test file permissions on FactoryTalk View SE directories.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file modifications in FactoryTalk directories
  • Unexpected process execution with elevated privileges
  • Failed permission change attempts

Network Indicators:

  • Unusual network traffic from FactoryTalk systems
  • Unexpected remote connections to affected systems

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectName LIKE '%FactoryTalk%' AND AccessMask=0x100

🔗 References

📤 Share & Export