Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-14216 | A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre. |
Solution
Rockwell Automation encourages users of the affected versions of FactoryTalk AssetCentre to update to AssetCentre v11 (or above) to addresses these vulnerabilities. For more information about these vulnerabilities and mitigations please see Rockwell Automation’s publication KnowledgeBase ID: PN1559
Workaround
Rockwell Automation recommends the following software/PC-based mitigation strategies: Run all software as User, not as an Administrator, to minimize the impact of malicious code on the infected system. Use Microsoft AppLocker or other similar allow list applications to help mitigate risk. Information on using AppLocker with Rockwell Automation products is available at Knowledge Base Article QA17329 Ensure the least-privilege user principle is followed, and user/service account access to shared resources (such as a database) is only granted with a minimum number of rights as needed.
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:39:59.120Z
Reserved: 2021-02-19T00:00:00.000Z
Link: CVE-2021-27462

Updated: 2024-08-03T20:48:17.184Z

Status : Modified
Published: 2022-03-23T20:15:08.770
Modified: 2024-11-21T05:58:02.407
Link: CVE-2021-27462

No data.

No data.