Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
References
Link | Resource |
---|---|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785 | Permissions Required Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01 | Mitigation Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-04-01T22:17:11
Updated: 2022-04-01T22:17:11
Reserved: 2021-05-13T00:00:00
Link: CVE-2021-32960
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-01T23:15:09.817
Modified: 2022-04-12T13:30:04.263
Link: CVE-2021-32960
JSON object: View
Redhat Information
No data.
CWE