1. EXECUTIVE SUMMARY
- CVSS v4 7.3
- ATTENTION: Exploitable remotely
- Vendor: Rockwell Automation
- Equipment: FactoryTalk Optix
- Vulnerability: Improper Input Validation
2. RISK EVALUATION
Successful exploitation of this vulnerability could result in an attacker achieving remote code execution.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following version of FactoryTalk Optix, a scalable, cloud-enabled visualization platform, is affected:
- FactoryTalk Optix: Versions 1.5.0 through 1.5.7
3.2 VULNERABILITY OVERVIEW
3.2.1 IMPROPER INPUT VALIDATION CWE-20
A security issue exists within FactoryTalk Optix MQTT broker due to the lack of URI sanitization. This flaw enables the loading of remote Mosquito plugins, which can be used to achieve remote code execution.
CVE-2025-9161 has been assigned to this vulnerability. A CVSS v3 base score of 7.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2025-9161. A base score of 7.3 has been calculated; the CVSS vector string is (AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).
3.3 BACKGROUND
- CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: United States
3.4 RESEARCHER
Rockwell Automation reported th
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: