Description

Microsoft has disclosed two critical security vulnerabilities in Rockwell Automation’s PanelView Plus that can be exploited by remote, unauthenticated attackers to execute arbitrary code and trigger a denial-of-service (DoS) condition. According to security researcher Yuval Gordon, the remote code execution vulnerability leverages two custom classes that can be manipulated to upload and load a malicious DLL into the device. The DoS vulnerability also utilizes these custom classes to send a crafted buffer that the device cannot handle properly, resulting in a DoS. The identified vulnerabilities are CVE-2023-2071 and CVE-2023-29464. CVE-2023-2071, with a CVSS score of 9.8, is an improper input validation flaw that enables unauthenticated attackers to achieve remote code execution via crafted malicious packets. CVE-2023-29464, scoring 8.2 on the CVSS, is another improper input validation flaw that permits an unauthenticated threat actor to read data from memory and cause a DoS by sending a packet larger than the buffer size. These vulnerabilities impact FactoryTalk View Machine Edition (versions 13.0, 12.0, and prior) and FactoryTalk Linx (versions 6.30, 6.20, and prior). Advisories for these flaws were released by Rockwell Automation in September and October 2023, with the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issuing alerts soon after. The revelation comes amid reports of unknown threat actors exploiting another critical security flaw in HTTP File Server (CVE-2024-23692, CVSS score: 9.8) to deliver cryptocurrency miners and trojans like Xeno RAT, Gh0st RAT, and PlugX. This vulnerability involves template injection, allowing remote, unauthenticated attackers to execute arbitrary commands via specially crafted HTTP requests.