CVE-2025-11696

N/A Unknown

📋 TL;DR

A local server-side request forgery vulnerability in Studio 5000 Simulation Interface allows any Windows user on the system to trigger outbound SMB requests, potentially enabling NTLM hash capture. This affects systems running vulnerable versions of the software, primarily in industrial control environments.

💻 Affected Systems

Products:
  • Studio 5000 Simulation Interface
Versions: All versions prior to v4.05.00
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows user access to the system running the vulnerable software.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture NTLM hashes, perform pass-the-hash attacks to gain elevated privileges, and potentially compromise the entire industrial control system.

🟠

Likely Case

Local attackers capture NTLM hashes from the system account running Studio 5000 Simulation Interface, enabling lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and SMB restrictions, impact is limited to the local system with no credential exposure.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring Windows user access to the affected system.
🏢 Internal Only: HIGH - Any Windows user on the system can exploit this, making internal threats significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local Windows user access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.05.00

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1760.html

Restart Required: Yes

Instructions:

1. Download Studio 5000 Simulation Interface v4.05.00 from Rockwell Automation. 2. Install the update following vendor instructions. 3. Restart the system.

🔧 Temporary Workarounds

Restrict SMB Outbound Traffic

windows

Block outbound SMB traffic from affected systems to prevent NTLM hash capture.

New-NetFirewallRule -DisplayName "Block SMB Outbound" -Direction Outbound -Protocol TCP -RemotePort 445 -Action Block

Implement SMB Signing

windows

Require SMB signing to prevent NTLM relay attacks even if hashes are captured.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Apply principle of least privilege and monitor for unusual SMB outbound connections

🔍 How to Verify

Check if Vulnerable:

Check Studio 5000 Simulation Interface version - if below v4.05.00, system is vulnerable.

Check Version:

Check the software version in Studio 5000 Simulation Interface application or Windows Programs and Features

Verify Fix Applied:

Verify version is v4.05.00 or higher and test that SMB outbound requests cannot be triggered via the API.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMB outbound connections from Studio 5000 Simulation Interface process
  • API calls to trigger external requests

Network Indicators:

  • SMB traffic from Studio 5000 Simulation Interface systems to unexpected destinations
  • NTLM authentication attempts from affected systems

SIEM Query:

source="windows" AND (process="Studio5000SimulationInterface.exe" AND destination_port=445)

🔗 References

📤 Share & Export