First published: Tue Jul 16 2024(Updated: )
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rockwell Automation FactoryTalk Policy Manager | =6.40.0 |
Users using the affected software are encouraged to implement the following steps to invalidate the existing vulnerable private keys/digital certificates and regenerate new secure ones. Security Best Practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-6325 is classified as High.
To fix CVE-2024-6325, you should upgrade Rockwell Automation FactoryTalk® Policy Manager to version 6.40.1 or later.
The risks associated with CVE-2024-6325 include potential unauthorized access and compromise of sensitive configurations.
CVE-2024-6325 affects Rockwell Automation FactoryTalk® Policy Manager version 6.40.0.
As of now, there is no publicly available information indicating CVE-2024-6325 is actively being exploited in the wild.