A critical vulnerability has been identified in Rockwell Automation’s Pavilion8, a model predictive control software, which affects versions prior to V5.20. This vulnerability consists of two issues: improper privilege management and path traversal, both of which can be exploited remotely with low attack complexity. The improper privilege management flaw (CVE-2024-7960) allows unauthorized users to access functions that should be restricted, thereby enabling them to view sensitive information or modify settings. Meanwhile, the path traversal vulnerability (CVE-2024-7961) could allow an attacker to upload arbitrary files to the system, potentially leading to remote code execution.
The vulnerabilities were assigned CVSS v4 scores of 8.8 for improper privilege management and 8.6 for path traversal, indicating they pose significant security risks to organizations that rely on Pavilion8. These issues are particularly concerning in critical manufacturing sectors, where the software is deployed worldwide. Exploiting these vulnerabilities could lead to serious breaches, including unauthorized access to sensitive data and the ability to execute malicious code on the affected systems. Rockwell Automation has urged users to update to Pavilion8 version 6.0 or later to mitigate these vulnerabilities.
CISA has recommended a range of defensive measures to protect control system networks from exploitation. These include minimizing network exposure for control system devices, isolating them behind firewalls, and ensuring that remote access is secured using updated Virtual Private Networks (VPNs). CISA further stresses the importance of performing impact analyses and risk assessments before implementing defensive measures to ensure they are appropriate and effective. Organizations should also follow CISA’s cybersecurity best practices for securing industrial control systems and take proactive steps to mitigate risks.
Although no public exploitation of these vulnerabilities has been reported, organizations are encouraged to remain vigilant and report any suspicious activity to CISA. The advisory emphasizes the importance of applying the necessary patches to fix the vulnerabilities and ensuring that all relevant security protocols are followed. Rockwell Automation and CISA have both highlighted the critical need for timely action to address these issues, as any delay could lead to potentially severe consequences for affected organizations.
Reference: