CVE-2024-7960

9.1 CRITICAL

📋 TL;DR

This CVE describes an incorrect privilege matrix vulnerability in Rockwell Automation products that allows authenticated users to access functions and view sensitive information beyond their intended permissions. Attackers can exploit this to modify system settings and access confidential data. Organizations using affected Rockwell Automation industrial control systems are at risk.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: All versions prior to v12.00.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the FactoryTalk View SE system; affects systems with multiple user accounts and role-based access control configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains administrative privileges, modifies critical industrial control system settings, disrupts manufacturing operations, steals proprietary information, and potentially causes physical damage or safety incidents.

🟠

Likely Case

Malicious insiders or compromised accounts access sensitive configuration data, modify operational parameters, and potentially disrupt industrial processes without full system takeover.

🟢

If Mitigated

With proper network segmentation, least privilege access controls, and monitoring, impact is limited to unauthorized data viewing within segmented network zones.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but minimal technical skill once authenticated; privilege escalation occurs through the flawed permission matrix.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk View SE v12.00.02

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View SE v12.00.02 from Rockwell Automation's website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the system. 5. Verify proper functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FactoryTalk View SE systems from general corporate networks and restrict access to authorized personnel only.

Enhanced Access Controls

all

Implement strict role-based access controls and regularly audit user permissions to minimize exposure.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Enforce multi-factor authentication and monitor all user activity for anomalous privilege usage

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View SE version in the software's About dialog or system information panel; versions below v12.00.02 are vulnerable.

Check Version:

Check the 'Help > About' menu in FactoryTalk View SE application

Verify Fix Applied:

Confirm installation of v12.00.02 or later via the software's version information and test that users cannot access functions beyond their assigned roles.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to privileged functions
  • User account accessing features outside their normal role patterns
  • Configuration changes from non-administrative accounts

Network Indicators:

  • Unexpected authentication requests to FactoryTalk systems
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="FactoryTalk" AND (event_type="privilege_escalation" OR user_action="unauthorized_access")

🔗 References

📤 Share & Export