CVE-2025-0498

9.8 CRITICAL

📋 TL;DR

A data exposure vulnerability in Rockwell Automation FactoryTalk AssetCentre allows threat actors to steal user authentication tokens due to insecure storage. This enables impersonation of legitimate users within industrial control systems. All versions prior to V15.00.001 are affected.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk AssetCentre
Versions: All versions prior to V15.00.001
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with FactoryTalk Security enabled. Industrial control systems using FactoryTalk AssetCentre for asset management are at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of FactoryTalk AssetCentre with unauthorized access to critical industrial control systems, potential manipulation of industrial processes, and lateral movement to other OT systems.

🟠

Likely Case

Unauthorized access to FactoryTalk AssetCentre with ability to view, modify, or delete asset management data, potentially disrupting industrial operations.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent token theft and lateral movement.

🌐 Internet-Facing: HIGH if exposed to internet, as token theft could lead to remote compromise.
🏢 Internal Only: HIGH due to potential for internal attackers or compromised internal systems to steal tokens and escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the system where tokens are stored. The vulnerability is in how tokens are stored, not in authentication mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V15.00.001

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk AssetCentre V15.00.001 from Rockwell Automation. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the system and verify functionality.

🔧 Temporary Workarounds

Restrict File System Access

windows

Limit access to directories where FactoryTalk Security tokens are stored to prevent unauthorized reading.

icacls "C:\ProgramData\Rockwell Automation\FactoryTalk Security\Tokens" /deny Everyone:(R)

Network Segmentation

all

Isolate FactoryTalk AssetCentre systems from untrusted networks and implement strict access controls.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring on systems storing FactoryTalk Security tokens.
  • Deploy network segmentation to isolate FactoryTalk AssetCentre from other systems and limit lateral movement potential.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk AssetCentre version in Control Panel > Programs and Features. If version is below V15.00.001, system is vulnerable.

Check Version:

wmic product where name="FactoryTalk AssetCentre" get version

Verify Fix Applied:

Verify version is V15.00.001 or higher and test that FactoryTalk Security tokens are no longer stored insecurely.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to token storage directories
  • Multiple failed authentication attempts followed by successful login from different location

Network Indicators:

  • Unusual network connections from FactoryTalk AssetCentre system
  • Traffic patterns indicating token exfiltration

SIEM Query:

EventID=4663 AND ObjectName LIKE "%FactoryTalk Security%Tokens%" AND AccessMask=0x1

🔗 References

📤 Share & Export