CVE-2025-7330

6.5 MEDIUM

📋 TL;DR

This CVE describes a cross-site request forgery vulnerability in Rockwell Automation products where missing CSRF checks allow attackers to modify configurations when logged-in administrators visit malicious links. The vulnerability affects administrators with configuration privileges who use affected Rockwell Automation software versions.

💻 Affected Systems

Products:
  • Rockwell Automation FactoryTalk View SE
Versions: All versions prior to V12.00.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges and user interaction with malicious content while authenticated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could modify critical system configurations, potentially disrupting industrial operations or creating safety hazards in industrial control systems.

🟠

Likely Case

Attackers could modify configuration settings to degrade system performance, create operational inefficiencies, or establish persistence for future attacks.

🟢

If Mitigated

With proper CSRF protections and administrative awareness, the risk is limited to targeted attacks requiring social engineering.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to trick authenticated administrators into visiting malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V12.00.02 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1756.html

Restart Required: No

Instructions:

1. Download FactoryTalk View SE V12.00.02 or later from Rockwell Automation support portal. 2. Follow standard upgrade procedures for FactoryTalk View SE installations. 3. Verify successful installation and functionality.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all forms requiring administrative actions

Administrative Session Timeout

all

Implement shorter session timeouts for administrative interfaces

🧯 If You Can't Patch

  • Restrict administrative access to trusted networks only
  • Implement web application firewall rules to detect CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View SE version in Control Panel > Programs and Features

Check Version:

wmic product where name="FactoryTalk View SE" get version

Verify Fix Applied:

Verify version is V12.00.02 or later and test form submissions for CSRF token validation

📡 Detection & Monitoring

Log Indicators:

  • Unexpected configuration changes in FactoryTalk logs
  • Multiple failed form submissions from same IP

Network Indicators:

  • HTTP POST requests to administrative endpoints without referrer headers
  • Requests with suspicious origin headers

SIEM Query:

source="FactoryTalk" AND (event_type="config_change" OR event_type="form_submission") AND NOT user_agent="browser_agent"

🔗 References

📤 Share & Export