First published: Thu May 11 2023(Updated: )
A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint. This vulnerability can be exploited in two ways. If an attacker sends a malicious link to a computer that is on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link, the attacker could impersonate the legitimate user and send requests to the affected product. Additionally, if an attacker sends an untrusted link to a computer that is not on the same domain as the server and a user opens the FactoryTalk Vantagepoint website, enters credentials for the FactoryTalk Vantagepoint server, and clicks on the malicious link a cross site request forgery attack would be successful as well.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk Vantagepoint | <8.40 |
Customers should upgrade to version 8.40 to fix the issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this cross site request forgery vulnerability is CVE-2023-2444.
CVE-2023-2444 has a severity rating of 8.8 (high).
The vulnerability can be exploited if an attacker sends a malicious link to a computer on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link.
FactoryTalk Vantagepoint up to version 8.40 is affected by this vulnerability.
To fix the vulnerability, it is recommended to update FactoryTalk Vantagepoint to a version beyond 8.40.