Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 | Permissions Required Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 | Mitigation Third Party Advisory US Government Resource |
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 | Permissions Required Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 8.5 |
References | () https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 - Permissions Required, Vendor Advisory | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2022-04-01 23:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-32960
Mitre link : CVE-2021-32960
CVE.ORG link : CVE-2021-32960
JSON object : View
Products Affected
rockwellautomation
- factorytalk_services_platform
CWE
CWE-863
Incorrect Authorization