Rockwell Automation PanelView Plus devices have been found to have two critical vulnerabilities that pose significant risks. The first, tracked as CVE-2023-2071, is a Remote Code Execution (RCE) vulnerability affecting FactoryTalk View Machine Edition. This flaw allows unauthenticated attackers to upload and execute malicious DLLs on the device by exploiting improper user input checks. The second vulnerability, identified as CVE-2023-29464, results in Denial of Service (DoS) and Information Disclosure through FactoryTalk Linx. Attackers can exploit this flaw by sending specially crafted packets that cause the device to become unresponsive or leak sensitive data.
The RCE vulnerability is particularly severe with a CVSS score of 9.8, enabling attackers to gain control of the device and execute arbitrary code. This is achieved by using a CIP class to upload a malicious library, bypassing security checks and allowing unauthorized code execution. The DoS vulnerability, rated with a CVSS base score of 8.2, allows attackers to disrupt communication by sending oversized packets, leading to unresponsiveness and potential leakage of confidential information.
Exploitation of these vulnerabilities involves manipulating custom classes in the PanelView Plus devices. Attackers can compile a malicious DLL, upload it to the device, and use specific functions to gain control. This process includes using legitimate function names to bypass security checks and execute the malicious code. Testing confirmed that this exploit provides complete control over the device, demonstrating the severe impact of these vulnerabilities.
To mitigate these risks, Rockwell Automation has released updates to address the vulnerabilities. Affected products include FactoryTalk View ME v12/v13 and FactoryTalk Linx v6.20/v6.30 on PanelView Plus devices. Users are advised to check their devices for these vulnerabilities and apply the necessary patches to secure their systems against potential exploits.