First published: Wed Mar 23 2022(Updated: )
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk AssetCentre | ||
rockwellautomation FactoryTalk AssetCentre | <=10.00 |
Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
As an additional mitigation, Rockwell Automation encourages users who are unable to upgrade or are concerned about unauthorized client connections to use built in security features found within FactoryTalk AssetCentre. Users should follow guidance found in QA46277. IPsec would minimize exposure to unauthorized clients and has been tested in FactoryTalk AssetCentre v9-v11
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27474 has a high severity rating due to its potential for remote, unauthenticated access and data modification.
To fix CVE-2021-27474, users should immediately update to a patched version of Rockwell Automation FactoryTalk AssetCentre that addresses this vulnerability.
CVE-2021-27474 affects Rockwell Automation FactoryTalk AssetCentre version 10.00 and earlier.
CVE-2021-27474 enables remote attackers to modify sensitive data without authentication.
For CVE-2021-27474, it is recommended to limit access to IIS remoting services as a temporary measure until a patch can be applied.