First published: Fri Oct 13 2023(Updated: )
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.
Credit: PSIRT@rockwellautomation.com PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwellautomation Factorytalk Linx | =6.20 | |
Rockwellautomation Factorytalk Linx | =6.30 |
* Install the security patches for the respective versions, referencing BF29637 - Patch: Hardening of the FactoryTalk Linx communications service for MobileView to authenticate and block improperly sized files, FactoryTalk Linx 6.20, 6.30 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140402 .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29464 is a vulnerability in FactoryTalk Linx in the Rockwell Automation PanelView Plus that allows an unauthenticated threat actor to read data from memory via crafted malicious packets.
The severity of CVE-2023-29464 is critical with a CVSS score of 9.1.
CVE-2023-29464 works by allowing an unauthenticated threat actor to send crafted malicious packets with a size larger than the buffer size, resulting in leakage of data from memory and information disclosure.
CVE-2023-29464 affects FactoryTalk Linx versions 6.20 and 6.30 in the Rockwell Automation PanelView Plus.
To fix CVE-2023-29464, it is recommended to upgrade to a patched version of FactoryTalk Linx provided by Rockwell Automation.