First published: Fri Jun 14 2024(Updated: )
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk View SE | ||
FactoryTalk View | >=11.0<14.0 |
* Corrected in software version v14.0. * Users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible. * It is recommended that users enforce proper access controls within the network and segment networks containing sensitive information using IPSec: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1090456 * Security Best Practice https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight s
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37368 is identified as a high-severity vulnerability due to the lack of proper user authentication.
To fix CVE-2024-37368, update Rockwell Automation FactoryTalk View SE to the latest version as recommended by the vendor.
CVE-2024-37368 affects Rockwell Automation FactoryTalk View SE versions 11.0 to 14.0.
Yes, CVE-2024-37368 can be exploited remotely by attackers to access HMI projects without proper authentication.
CVE-2024-37368 can lead to unauthorized access to sensitive user data within the HMI projects.