A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
Advisories

No advisories yet.

Fixes

Solution

3.0.0 https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx


Workaround

No workaround given by the vendor.

History

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Rockwellautomation
Rockwellautomation studio 5000 Simulation Interface
Vendors & Products Rockwellautomation
Rockwellautomation studio 5000 Simulation Interface

Tue, 11 Nov 2025 14:00:00 +0000

Type Values Removed Values Added
Description A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.
Title Studio 5000 ® Simulation Interface SSRF
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Rockwell

Published:

Updated: 2025-11-12T20:03:19.564Z

Reserved: 2025-10-13T16:22:27.307Z

Link: CVE-2025-11696

cve-icon Vulnrichment

Updated: 2025-11-12T14:54:34.321Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-11T14:15:34.640

Modified: 2025-11-12T16:19:34.210

Link: CVE-2025-11696

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-12T12:42:29Z