First published: Wed Mar 23 2022(Updated: )
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk AssetCentre | ||
rockwellautomation FactoryTalk AssetCentre | <=10.00 |
Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
As an additional mitigation, Rockwell Automation encourages users who are unable to upgrade or are concerned about unauthorized client connections to use built in security features found within FactoryTalk AssetCentre. Users should follow guidance found in QA46277. IPsec would minimize exposure to unauthorized clients and has been tested in FactoryTalk AssetCentre v9-v11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27470 has been classified as a high severity vulnerability due to its potential to allow remote command execution.
To mitigate CVE-2021-27470, it is recommended to update Rockwell Automation FactoryTalk AssetCentre to a version later than v10.00.
CVE-2021-27470 affects Rockwell Automation FactoryTalk AssetCentre version 10.00 and earlier.
Yes, CVE-2021-27470 can be exploited by remote, unauthenticated attackers.
CVE-2021-27470 is a deserialization vulnerability that affects the verification of serialized data.