CVE-2024-7847

7.7 HIGH

📋 TL;DR

This vulnerability allows attackers to embed malicious VBA scripts in Rockwell Automation project files (RSP/RSS). When a legitimate user opens an infected file, the script executes automatically without user interaction, potentially leading to remote code execution. Organizations using affected Rockwell Automation products are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View Studio
  • Rockwell Automation RSLogix 5000
  • Rockwell Automation Studio 5000 Logix Designer
Versions: Multiple versions - see vendor advisory for specific affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to open malicious RSP/RSS project files. VBA scripting feature must be enabled (typically enabled by default in affected products).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, unauthorized remote code execution on engineering workstations, potential impact on connected physical devices and processes.

🟠

Likely Case

Compromise of engineering workstations through social engineering, leading to data theft, lateral movement within OT networks, and potential disruption of industrial operations.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and user awareness training preventing malicious file execution.

🌐 Internet-Facing: LOW - This requires user interaction with malicious files, not directly internet-exposed services.
🏢 Internal Only: HIGH - Significant risk within OT/industrial networks where users regularly exchange project files and may lack security awareness.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to deliver malicious project files. Once opened, execution is automatic if VBA scripting is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See vendor advisory for specific patched versions

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1701.html

Restart Required: Yes

Instructions:

1. Review Rockwell Automation advisory SD1701. 2. Identify affected products and versions in your environment. 3. Apply vendor-provided patches/updates. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Disable VBA Scripting

windows

Disable the VBA scripting feature in affected Rockwell Automation products to prevent automatic script execution.

Configure through product settings: Tools > Options > Security > Disable VBA scripting

Restrict Project File Execution

windows

Implement application control to only allow execution of trusted/signed project files.

Use Windows AppLocker or similar to restrict .rsp/.rss file execution

🧯 If You Can't Patch

  • Implement strict network segmentation between engineering workstations and other networks
  • Train users to never open project files from untrusted sources and enable macro/content warnings

🔍 How to Verify

Check if Vulnerable:

Check installed Rockwell Automation software versions against advisory SD1701. Verify if VBA scripting is enabled in product settings.

Check Version:

Check version in Rockwell Automation software: Help > About or via Windows Programs and Features

Verify Fix Applied:

Verify patch installation through product version check. Confirm VBA scripting is disabled or restricted in security settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected VBA script execution in application logs
  • Multiple failed attempts to open project files
  • Unusual process creation from Rockwell applications

Network Indicators:

  • Unexpected network connections from engineering workstations
  • SMB/NFS transfers of project files from untrusted sources

SIEM Query:

Process creation where parent_process contains 'FactoryTalk' OR 'RSLogix' AND process_name contains 'cmd.exe' OR 'powershell.exe'

🔗 References

📤 Share & Export