CVE-2025-7329

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Rockwell Automation products allows authenticated attackers to inject malicious scripts into configuration fields. This could enable session hijacking, data theft, or denial of service attacks against administrators. Only systems with admin access are directly vulnerable.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: All versions prior to V12.00.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication to exploit. Affects configuration fields that lack proper input sanitization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control, steals sensitive data, or permanently disables the system by injecting destructive scripts.

🟠

Likely Case

Attacker hijacks admin sessions to modify configurations, steal credentials, or deploy additional malware.

🟢

If Mitigated

Limited impact due to proper input validation, output encoding, and admin access controls preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin credentials and knowledge of vulnerable configuration fields. No public exploits available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V12.00.02 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1756.html

Restart Required: No

Instructions:

1. Download FactoryTalk View SE V12.00.02 or later from Rockwell Automation. 2. Install the update following vendor documentation. 3. Verify the installation completes successfully.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side validation to reject or sanitize special characters in configuration fields.

Enable Output Encoding

all

Ensure all user-controlled data is properly encoded before rendering in web interfaces.

🧯 If You Can't Patch

  • Restrict admin access to trusted users only and implement multi-factor authentication.
  • Monitor configuration changes and audit logs for suspicious admin activity.

🔍 How to Verify

Check if Vulnerable:

Check if FactoryTalk View SE version is below V12.00.02 in the software's about or version information.

Check Version:

Check the software's help menu or about dialog for version information.

Verify Fix Applied:

Confirm the software version is V12.00.02 or higher after applying the patch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration changes by admin users
  • Script tags or JavaScript in configuration field logs

Network Indicators:

  • Unexpected outbound connections from admin interfaces
  • Suspicious payloads in HTTP requests to configuration endpoints

SIEM Query:

source="factorytalk_logs" AND (event_type="config_change" AND user="admin" AND (data CONTAINS "<script>" OR data CONTAINS "javascript:"))

🔗 References

📤 Share & Export