First published: Fri Apr 01 2022(Updated: )
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk Services Platform | <=6.11.00 | |
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed |
Rockwell Automation encourages those using the affected software to update to FactoryTalk Services Platform v6.20 or later to address the associated risk. Please see the Rockwell Automation publication regarding this issue for more information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-32960 is high with a severity value of 8.8.
CVE-2021-32960 affects Rockwell Automation FactoryTalk Services Platform v6.11 and earlier if FactoryTalk Security is enabled and deployed.
CVE-2021-32960 is a vulnerability in Rockwell Automation FactoryTalk Services Platform that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name.
CVE-2021-32960 can be exploited by a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name.
Yes, you can find more information about CVE-2021-32960 at the following references: [Reference 1](https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785), [Reference 2](https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01)