First published: Fri Oct 27 2023(Updated: )
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
>=11.0<=13.0 |
* Install the patch that remediates the issue: BF29581 - Patch: External Service Interaction (HTTP), FactoryTalk View SE 11.0, 12.0 13.0 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140243 .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46289 is a vulnerability in Rockwell Automation FactoryTalk View Site Edition that allows threat actors to send malicious data, potentially causing the product to become unavailable and requiring a restart to recover.
CVE-2023-46289 affects Rockwell Automation FactoryTalk View Site Edition by insufficiently validating user input, which can allow threat actors to send malicious data and bring the product offline.
CVE-2023-46289 has a severity rating of 7.5 (high).
The Common Weakness Enumeration (CWE) ID of CVE-2023-46289 is 20.
To fix CVE-2023-46289 in Rockwell Automation FactoryTalk View Site Edition, ensure you have the latest version installed, as updates may include patches for this vulnerability. Additionally, follow the recommendations provided by the vendor.