First published: Thu Sep 12 2024(Updated: )
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.
Credit: PSIRT@rockwellautomation.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Rockwellautomation 2800c Optixpanel Compact Firmware | >=4.0.0.325<4.0.2.116 | |
Rockwellautomation 2800c Optixpanel Compact | ||
All of | ||
Rockwellautomation 2800s Optixpanel Standard Firmware | >=4.0.0.350<4.0.2.123 | |
Rockwellautomation 2800s Optixpanel Standard | ||
All of | ||
Rockwellautomation Embedded Edge Compute Module Firmware | >=4.0.0.347<4.0.2.106 | |
Rockwellautomation Embedded Edge Compute Module |
Affected Product First Known in Software Version Corrected in Software Version 2800C OptixPanel™ Compact 4.0.0.325 4.0.2.116 2800S OptixPanel™ Standard 4.0.0.350 4.0.2.123 Embedded Edge Compute Module 4.0.0.347 4.0.2.106 Mitigations and Workarounds Customers using the affected software are encouraged to apply security best practices * For information on how to mitigate Security Risks on industrial automation control systems, we encourage customers to implement our suggested security best practices https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight to minimize the risk of the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.