Your one-stop web resource providing safety and security information to manufacturers

Rockwell Automation released an advisory regarding a missing authorization vulnerability in its PanelView Plus 6 700-1500, according to a report with ICS-CERT.

Successful exploitation of this remotely exploitable vulnerability, which Rockwell self reported, could allow an attacker to remotely access the device to potentially retrieve data or disrupt the availability of the device.

Digital Canal’s Wind Analysis Updated
Phoenix Broadband Mitigates BMS Hole
GE Updates Multilin SR Fix
GE Updates Proficy Vulnerability

The following versions of PanelView Plus 6 700-1500, graphic terminals and logic module products, suffer from the issue:
• 6.00.04
• 6.00.05
• 6.00.42
• 6.00-20140306
• 6.10.20121012
• 6.10-20140122
• 7.00-20121012
• 7.00-20130108
• 7.00-20130325
• 7.00-20130619
• 7.00-20140128
• 7.00-20140310
• 7.00-20140429
• 7.00-20140621
• 7.00-20140729
• 7.00-20141022
• 8.00-20140730
• 8.00-20141023
Rockwell Automation also said graphic terminals running OS 2.31 or greater are not affected by this vulnerability.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level would be able to leverage the vulnerability.

Cyber Security

There is no authorization check when connecting to the device, allowing an attacker remote access.

CVE-2017-7914 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 8.6.

The product sees action in the critical manufacturing, energy, food and agriculture, transportation systems, and water and wastewater systems sectors. The product also sees use on a global basis.

Rockwell Automation released a security advisory, however, a login is required to view the advisory.

Milwaukee, WI-based Rockwell Automation reports affected users should update to any of the following available firmware revisions that address the vulnerability:
• V7.00: Apply V7.00-20150209
• V8.00: Apply V8.00-20160418
• V8.10: Apply V8.10-20151026 or later
• V8.20: Apply V8.20-20160308 or later
• V9.00: Apply V9.00-20170328 or later

Click here for downloads for the firmware revisions.

Pin It on Pinterest

Share This