Vulnerability Description
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rockwellautomation | Factorytalk Services Platform | <= 6.11.00 |
Related Weaknesses (CWE)
References
- https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785Permissions RequiredVendor Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01MitigationThird Party AdvisoryUS Government Resource
- https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131785Permissions RequiredVendor Advisory
- https://www.cisa.gov/uscert/ics/advisories/icsa-21-161-01MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2021-32960?
CVE-2021-32960 is a vulnerability with a CVSS score of 8.5 (HIGH). Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass ...
How severe is CVE-2021-32960?
CVE-2021-32960 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32960?
Check the references section above for vendor advisories and patch information. Affected products include: Rockwellautomation Factorytalk Services Platform.