Critical Vulnerabilities in Rockwell Automation FactoryTalk AssetCentre

 Critical Vulnerabilities in Rockwell Automation FactoryTalk AssetCentre

Rockwell Automation's FactoryTalk AssetCentre, a critical component in industrial control systems, recently faced three significant security vulnerabilities (CVE-2025-0477, CVE-2025-0497, and CVE-2025-0498) that collectively threaten operational security across manufacturing and energy sectors. These flaws enable credential theft, system impersonation, and unauthorized access to sensitive industrial networks.

CVE-2025-0477: Weak Encryption Vulnerability (CVSS 9.8)  

Technical Overview  
This critical vulnerability allows attackers to decrypt stored credentials in FactoryTalk AssetCentre versions prior to v15.00.01 due to flawed encryption implementation. The weakness stems from using obsolete cryptographic standards for password storage in the application's database.Sample Attack Scenario
A maintenance contractor with temporary database access uses SQL injection techniques to export the UserCredentials table. Using open-source decryption tools, they crack 68% of hashed passwords within 4 hours, including administrative accounts controlling PLC programming interfaces. The attacker then deploys ransomware across 14 production lines through compromised engineering workstations.Mitigation Requirements

  • Immediate upgrade to v15.00.01 with AES-256-GCM encryption implementation
  • Database access restriction to <5 authorized personnel
  • Legacy system patches via January 2025 Patch Rollup (V11-V13 systems)

CVE-2025-0497: Configuration File Exposure (CVSS 7.3)

Technical Breakdown  
Credentials remain unprotected in configuration files for:

  • EventLogAttachmentExtractor
  • ArchiveExtractor utilities 
  • LogCleanUp services

Operational Impact Scenario
An infected HVAC contractor laptop with basic user privileges accesses C:\ProgramData\RA\FTAC\config.xml, harvesting SMTP credentials used for alarm notifications. Attackers establish persistent access through email gateway compromise, intercepting 2,300+ system alerts about abnormal pressure readings before technicians respond.Remediation Steps 

  1. Delete plaintext credentials from *.config files post-patching
  2. Implement filesystem ACLs with DENY permissions for service accounts
  3. Rotate all SMTP/SCADA credentials post-mitigation

CVE-2025-0498: Security Token Compromise (CVSS 7.8)

Architectural Flaw
FactoryTalk Security tokens stored in memory dumps without proper isolation, enabling privilege escalation through token replay attacks.Impersonation Attack Example
During a night shift, attackers trigger a BSOD on an HMI panel using specially crafted OPC UA requests. The resulting crash dump contains valid security tokens, which attackers use to:

  • Modify batch recipes in Historian databases
  • Disable safety interlocks on reactor vessels
  • Forge maintenance logs to hide equipment wear

Containment Measures

  • Token binding to source IP/MAC addresses in v15.00.01
  • Physical USB port disabling on ICS workstations
  • Memory protection via Credential Guard on Windows hosts

Cross-Vulnerability Defense Strategy

ControlCVE-0477CVE-0497CVE-0498
Patch Latency<24 hrs Critical<72 hrs High<48 hrs High
Network SegmentationVLAN 10 IsolationSubnet 192.168.5.0/24DMZ Exclusion
Monitoring FocusDatabase Query PatternsFile Integrity ChangesToken Usage Anomalies

Industrial operators must prioritize updating to FactoryTalk AssetCentre v15.00.01 within 72-hour SLA windows, particularly for systems interfacing with MODBUS/TCP and PROFINET networks. Rockwell's January 2025 patches demonstrate improved credential handling, but require concurrent physical access controls and network segmentation to prevent lateral movement. 

Crow

physics, information technologies, author, educator

Post a Comment

Hello, share your thoughts with us.

Previous Post Next Post

İletişim Formu