CVE-2025-9064

9.1 CRITICAL

📋 TL;DR

An unauthenticated path traversal vulnerability in FactoryTalk View Machine Edition allows attackers on the same network to delete arbitrary files on the panel's operating system. This affects industrial control systems using vulnerable versions of the software. Attackers need to know specific filenames to target for successful exploitation.

💻 Affected Systems

Products:
  • FactoryTalk View Machine Edition
Versions: Versions prior to 13.00.00
Operating Systems: Windows-based panel operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where FactoryTalk View Machine Edition is installed on panels accessible via network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical system files could be deleted, causing panel operating system corruption, production downtime, or safety system disruption in industrial environments.

🟠

Likely Case

Attackers delete configuration files, logs, or application files to disrupt operations or cover tracks after other attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments.

🌐 Internet-Facing: LOW - This requires network adjacency and is not typically exposed to the internet in industrial environments.
🏢 Internal Only: HIGH - Attackers on the same network segment can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access and knowledge of target filenames, but no authentication or special privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 13.00.00 or later

Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1753.html

Restart Required: Yes

Instructions:

1. Download FactoryTalk View Machine Edition version 13.00.00 or later from Rockwell Automation. 2. Backup existing configurations. 3. Install the update following vendor documentation. 4. Restart the panel system.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FactoryTalk View panels on dedicated network segments with strict access controls.

Firewall Rules

all

Implement firewall rules to restrict network access to FactoryTalk View panels only from authorized engineering stations.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable panels from general network traffic.
  • Deploy host-based firewalls on panels to restrict incoming connections to only necessary sources.

🔍 How to Verify

Check if Vulnerable:

Check FactoryTalk View Machine Edition version in the software's About dialog or control panel.

Check Version:

Check via FactoryTalk View Machine Edition interface or Windows Programs and Features.

Verify Fix Applied:

Confirm version is 13.00.00 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in system logs
  • Failed file access attempts to sensitive paths

Network Indicators:

  • Unusual network traffic to FactoryTalk View panels from unauthorized sources
  • HTTP requests with path traversal patterns

SIEM Query:

source="FactoryTalk" AND (event_type="file_delete" OR path_contains="../")

🔗 References

📤 Share & Export