CVE-2020-12028

HIGH

Rockwellautomation Factorytalk View - Missing Authentication

Title source: rule

Description

In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/scada/rockwell_factorytalk_rce.rb

Scores

CVSS v3 7.3
EPSS 0.2989
EPSS Percentile 96.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

Classification

CWE
CWE-306 CWE-264
Status published

Affected Products (1)

rockwellautomation/factorytalk_view

Timeline

Published Jul 20, 2020
Tracked Since Feb 18, 2026