Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-6967 : Vulnerability Insights and Analysis

Learn about CVE-2020-6967 affecting Rockwell Automation's FactoryTalk Diagnostics software. Discover the impact, affected systems, exploitation risks, and mitigation steps.

FactoryTalk Diagnostics software by Rockwell Automation is vulnerable to insecure deserialization of untrusted data, potentially exposing systems to attacks.

Understanding CVE-2020-6967

FactoryTalk Diagnostics software, a component of the FactoryTalk Services Platform, is affected by a deserialization vulnerability that could be exploited by attackers.

What is CVE-2020-6967?

In Rockwell Automation's FactoryTalk Diagnostics software, an insecure .NET Remoting endpoint is exposed via RNADiagnosticsSrv.exe at TCP port 8082, allowing for the insecure deserialization of untrusted data.

The Impact of CVE-2020-6967

This vulnerability could be exploited by malicious actors to execute arbitrary code, leading to potential system compromise and unauthorized access to sensitive information.

Technical Details of CVE-2020-6967

FactoryTalk Diagnostics software vulnerability details.

Vulnerability Description

The vulnerability lies in the insecure deserialization of untrusted data within the FactoryTalk Diagnostics software.

Affected Systems and Versions

        Rockwell Automation All versions of FactoryTalk Diagnostics software, a subsystem of the FactoryTalk Services Platform.

Exploitation Mechanism

Attackers can exploit this vulnerability by sending malicious data to the .NET Remoting endpoint, potentially leading to arbitrary code execution.

Mitigation and Prevention

Protecting systems from CVE-2020-6967.

Immediate Steps to Take

        Implement network segmentation to limit exposure of vulnerable systems.
        Monitor network traffic for any suspicious activity targeting port 8082.
        Apply vendor-supplied patches or updates to address the vulnerability.

Long-Term Security Practices

        Regularly update and patch all software components to prevent known vulnerabilities.
        Conduct security assessments and penetration testing to identify and address potential weaknesses.

Patching and Updates

        Rockwell Automation may release patches or updates to fix the deserialization vulnerability. Ensure timely application of these fixes to secure systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now