CVE-2025-9063

9.8 CRITICAL

📋 TL;DR

An authentication bypass vulnerability in FactoryTalk View Machine Edition's Web Browser ActiveX control allows attackers to gain unauthorized access to PanelView Plus 7 Series B devices. This enables access to file systems, diagnostic information, and event logs without valid credentials. Industrial organizations using these Rockwell Automation products are affected.

💻 Affected Systems

Products:
  • FactoryTalk View Machine Edition
  • PanelView Plus 7 Series B
Versions: FactoryTalk View Machine Edition versions prior to 13.00.00
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Web Browser ActiveX control to be enabled and accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, unauthorized access to sensitive operational data, potential manipulation of industrial processes, and disruption of manufacturing operations.

🟠

Likely Case

Unauthorized access to device file systems, theft of diagnostic information and event logs, potential reconnaissance for further attacks on industrial networks.

🟢

If Mitigated

Limited impact if devices are properly segmented, have network access controls, and are monitored for anomalous access patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass suggests straightforward exploitation once access to the control is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FactoryTalk View Machine Edition 13.00.00

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1753.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View Machine Edition 13.00.00 from Rockwell Automation. 2. Install the update on affected systems. 3. Restart systems to apply changes. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable ActiveX Control

windows

Disable the vulnerable Web Browser ActiveX control to prevent exploitation

Use Windows Group Policy or registry settings to disable the specific ActiveX control

Network Segmentation

all

Isolate affected devices from untrusted networks

Configure firewall rules to restrict access to PanelView devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Deploy network monitoring and intrusion detection for anomalous access patterns

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View Machine Edition version - if below 13.00.00, the system is vulnerable

Check Version:

Check version in FactoryTalk View Machine Edition application or Windows Programs and Features

Verify Fix Applied:

Verify FactoryTalk View Machine Edition version is 13.00.00 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to PanelView devices
  • Unexpected file system access patterns
  • Anomalous diagnostic information retrieval

Network Indicators:

  • Unexpected traffic to PanelView Plus 7 devices
  • ActiveX control access from unauthorized sources

SIEM Query:

source_ip=* AND dest_ip=PanelView_IP AND (event_type="authentication_bypass" OR protocol="ActiveX")

🔗 References

📤 Share & Export