Rockwell Automation has updated software to handle an improper access control vulnerability in its PanelView 5510, according to a report with NCCIC.
Successful exploitation of this remotely exploitable vulnerability could allow a remote unauthenticated user to gain root privileges on the device. Rockwell self-reported the vulnerability.
All versions of PanelView 5510 manufactured before March 13, 2019, that have never been updated to v4.003, v5.002, or later suffer from the issue.
A remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device’s file system.
CVE-2019-10970 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.
The product sees use mainly in the critical manufacturing, food and agriculture, transportation, and water and wastewater systems sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability.
Rockwell Automation reports users using PanelView 5510 with manufacturing dates prior to March 13, 2019, are encouraged to update to an available revision that addresses the associated risk.
For PanelView 5510 using v4, apply v4.003 or later and for PanelView 5510 using v5, apply v5.002 or later. Click here to download an updates, login required.
Rockwell Automation also recommended applying the following mitigations:
• Block all traffic to EtherNet/IP or other CIP protocol-based devices from outside the manufacturing zone by blocking or restricting access to Ports 2222 and 44818/TCP and UDP using proper network infrastructure controls, such as firewalls, UTM devices, or other security appliances
• Use trusted software, software patches, antivirus/anti-malware programs, and interact only with trusted websites and attachments
For more information see Rockwell Automation security advisory 1088080, login required.