A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
Advisories

No advisories yet.

Fixes

Solution

3.0.0 https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx


Workaround

No workaround given by the vendor.

History

Tue, 11 Nov 2025 14:00:00 +0000

Type Values Removed Values Added
Description A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
Title Studio 5000 ® Simulation Interface SSRF
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-11-11T13:47:10.872Z

Reserved: 2025-10-13T16:22:27.307Z

Link: CVE-2025-11696

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-11T14:15:34.640

Modified: 2025-11-11T14:15:34.640

Link: CVE-2025-11696

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.