First published: Wed Mar 23 2022(Updated: )
The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk AssetCentre | ||
rockwellautomation FactoryTalk AssetCentre | <=10.00 |
Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
As an additional mitigation, Rockwell Automation encourages users who are unable to upgrade or are concerned about unauthorized client connections to use built in security features found within FactoryTalk AssetCentre. Users should follow guidance found in QA46277. IPsec would minimize exposure to unauthorized clients and has been tested in FactoryTalk AssetCentre v9-v11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27468 has a high severity rating due to its potential for remote exploitation by unauthorized users.
To fix CVE-2021-27468, update your Rockwell Automation FactoryTalk AssetCentre to a version later than 10.00 that includes proper authentication measures.
The risks associated with CVE-2021-27468 include unauthorized execution of arbitrary SQL statements which can lead to data leakage or manipulation.
CVE-2021-27468 affects Rockwell Automation FactoryTalk AssetCentre version 10.00 and earlier.
Yes, CVE-2021-27468 can be exploited remotely by unauthenticated attackers due to the lack of proper authentication measures.