First published: Wed Mar 23 2022(Updated: )
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk AssetCentre | ||
rockwellautomation FactoryTalk AssetCentre | <=10.00 |
Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
As an additional mitigation, Rockwell Automation encourages users who are unable to upgrade or are concerned about unauthorized client connections to use built in security features found within FactoryTalk AssetCentre. Users should follow guidance found in QA46277. IPsec would minimize exposure to unauthorized clients and has been tested in FactoryTalk AssetCentre v9-v11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27462 is considered critical due to its potential for remote code execution by unauthenticated attackers.
To remediate CVE-2021-27462, upgrade to the latest version of Rockwell Automation FactoryTalk AssetCentre that addresses this vulnerability.
CVE-2021-27462 affects Rockwell Automation FactoryTalk AssetCentre versions 10.00 and earlier.
Yes, CVE-2021-27462 can be exploited remotely without authentication.
CVE-2021-27462 enables attackers to execute arbitrary commands on the affected system.