CVE-2025-9068
📋 TL;DR
This vulnerability allows authenticated Windows users to hijack a repair process in Rockwell Automation's FTLinx software, gaining SYSTEM-level command prompt access. Attackers can then access all files, processes, and system resources. Organizations using affected Rockwell Automation products with FTLinx are at risk.
💻 Affected Systems
- Rockwell Automation FTLinx
📦 What is this software?
Factorytalk Linx by Rockwellautomation
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges leading to data theft, ransomware deployment, industrial control system manipulation, and complete network takeover.
Likely Case
Privilege escalation leading to lateral movement within the network, credential harvesting, and installation of persistent backdoors.
If Mitigated
Limited impact due to strict access controls, network segmentation, and monitoring preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated Windows access and knowledge of the repair process hijack technique.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific version
Vendor Advisory: https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1754.html
Restart Required: Yes
Instructions:
1. Review Rockwell Automation advisory SD1754
2. Download and install the latest FTLinx update
3. Restart affected systems
4. Verify patch installation
🔧 Temporary Workarounds
Restrict User Permissions
windowsLimit Windows user permissions to prevent unauthorized repair process initiation
Network Segmentation
allIsolate Rockwell Automation systems from general network access
🧯 If You Can't Patch
- Implement strict access controls and least privilege principles for all users
- Monitor for unusual repair process activity and command prompt execution
🔍 How to Verify
Check if Vulnerable:
Check FTLinx version against vendor advisory and verify MSI repair functionality exists
Check Version:
Check FTLinx application properties or vendor documentation
Verify Fix Applied:
Confirm FTLinx is updated to patched version and test repair functionality
📡 Detection & Monitoring
Log Indicators:
- Unexpected vbpinstall.exe execution
- Repair process initiation by non-admin users
- Command prompt launched with SYSTEM privileges
Network Indicators:
- Unusual outbound connections from Rockwell systems
SIEM Query:
Process creation where (parent_process contains 'vbpinstall.exe' OR process_name contains 'cmd.exe') AND integrity_level contains 'SYSTEM'