Alert: Remote Code Execution and DoS in Rockwell Automation Systems PanelView Plus

rockwell automation

Recently Microsoft has disclosed two critical security flaws in Rockwell Automation’s PanelView Plus that can be exploited by remote, unauthenticated attackers to execute arbitrary code and instigate a denial-of-service (DoS) condition. These vulnerabilities pose a substantial risk to industrial control systems, which are crucial for managing and automating manufacturing processes.

Understanding the Vulnerabilities

The first vulnerability, identified as CVE-2023-2071 with a CVSS score of 9.8, is an improper input validation flaw. This vulnerability allows unauthenticated attackers to achieve remote code execution through specially crafted malicious packets. Security researcher Yuval Gordon explains, “The [remote code execution] vulnerability in PanelView Plus involves two custom classes that can be abused to upload and load a malicious DLL into the device.”

The second vulnerability, CVE-2023-29464, with a CVSS score of 8.2, also stems from improper input validation. It enables an unauthenticated threat actor to read data from memory by sending crafted malicious packets and can result in a DoS condition by sending a packet larger than the buffer size. Gordon further elaborates, “The DoS vulnerability takes advantage of the same custom class to send a crafted buffer that the device is unable to handle properly, thus leading to a DoS.”

Impact and Affected Versions

The exploitation of these vulnerabilities can have severe consequences. Successful exploitation of CVE-2023-2071 permits an adversary to execute code remotely, potentially allowing them to take over the device completely. On the other hand, CVE-2023-29464 can lead to information disclosure or cause the device to become unresponsive, disrupting operations significantly.

CVE-2023-2071 primarily impacts FactoryTalk View Machine Edition (versions 13.0, 12.0, and prior), while CVE-2023-29464 affects FactoryTalk Linx (versions 6.30, 6.20, and prior). Advisories for these flaws were released by Rockwell Automation on September 12, 2023, and October 12, 2023, respectively. In response, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued alerts on September 21 and October 17 to raise awareness and prompt action from affected users.

Broader Implications in the Cybersecurity Landscape

The disclosure of these vulnerabilities comes amid a broader context of rising cyber threats targeting industrial control systems. Unknown threat actors are reportedly exploiting a recently disclosed critical security flaw in HTTP File Server (CVE-2024-23692, CVSS score: 9.8). This vulnerability, characterized by template injection, allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request.

Exploitation of CVE-2024-23692 has been linked to the delivery of cryptocurrency miners and trojans such as Xeno RAT, Gh0st RAT, and PlugX. These malicious activities highlight the increasing sophistication and frequency of cyberattacks targeting industrial environments, emphasizing the need for robust cybersecurity measures.

patch now

Mitigation and Response

In light of these critical vulnerabilities, it is imperative for organizations using Rockwell Automation’s PanelView Plus to take immediate action. Rockwell Automation has released patches and updates to address these flaws, and users are strongly encouraged to apply these updates without delay. Additionally, implementing network segmentation and employing intrusion detection systems can help mitigate the risk of exploitation.

Organizations should also consider conducting regular security assessments and vulnerability scans to identify and address potential weaknesses in their systems. Employee training on cybersecurity best practices is crucial, as human error often plays a significant role in successful cyberattacks.

The Role of Cybersecurity Agencies

The proactive stance of cybersecurity agencies like CISA in issuing alerts and advisories is critical in the fight against cyber threats. By disseminating information about vulnerabilities and providing guidance on mitigation strategies, these agencies help organizations stay ahead of potential attacks.

Furthermore, collaboration between technology providers, cybersecurity researchers, and regulatory bodies is essential for creating a resilient cybersecurity ecosystem. Sharing threat intelligence and best practices can enhance the collective defense against cyber adversaries.

Conclusion

The uncovering of critical flaws in Rockwell Automation’s PanelView Plus by Microsoft underscores the importance of continuous vigilance and proactive measures in cybersecurity. As industrial control systems become increasingly interconnected, the potential impact of cyberattacks grows, necessitating robust security protocols and prompt response mechanisms.

Organizations must remain informed about emerging threats and prioritize the implementation of security updates to safeguard their systems. In the ever-evolving landscape of cybersecurity, staying one step ahead of attackers is crucial to ensuring the integrity and reliability of industrial operations.

Follow us on x twitter (Twitter) for real time updates and exclusive content.

1 thought on “Alert: Remote Code Execution and DoS in Rockwell Automation Systems PanelView Plus”

  1. Pingback: Polyfill[.]io Supply Chain Attack Affects Over 38000 Hosts

Comments are closed.

Scroll to Top