CVE-2024-21917: CWE-347 Improper Verification of Cryptographic Signature in Rockwell Automation FactoryTalk® Service Platform
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory. If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.
AI Analysis
Technical Summary
CVE-2024-21917 is a critical security vulnerability identified in Rockwell Automation's FactoryTalk® Service Platform (FTSP), a widely used industrial automation software suite. The root cause is an improper verification of cryptographic signatures (CWE-347), specifically the absence of digital signing between the FTSP service token and the directory service. This design flaw allows an attacker to capture or obtain a valid FTSP service token and reuse it to authenticate against a different FTSP directory, effectively bypassing authentication controls. Because the service token is not cryptographically bound to a specific directory, the attacker can impersonate legitimate users or services, gaining unauthorized access. Once authenticated, the attacker can retrieve sensitive user information and modify system settings, potentially disrupting industrial processes or causing data breaches. The vulnerability affects all FTSP versions up to and including 6.31. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's network attack vector, lack of required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a high-risk issue for organizations relying on FTSP for industrial control systems. The vulnerability was publicly disclosed on January 31, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize Rockwell Automation's FactoryTalk® Service Platform, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to sensitive operational data and control settings, potentially causing operational disruptions, safety hazards, and financial losses. The ability to modify system settings without authentication could allow attackers to sabotage industrial processes or cause downtime. Additionally, unauthorized retrieval of user information may lead to further targeted attacks or compliance violations under GDPR due to data breaches. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. The lack of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if mitigations are not applied promptly.
Mitigation Recommendations
1. Immediate upgrade to a patched version of FactoryTalk® Service Platform once Rockwell Automation releases a fix addressing CVE-2024-21917. 2. Until a patch is available, implement network segmentation to isolate FTSP servers from general IT networks and restrict access to trusted hosts only. 3. Employ strict firewall rules and access control lists (ACLs) to limit inbound and lateral traffic to FTSP directories. 4. Monitor network traffic for anomalous authentication attempts or token reuse across different directories. 5. Use multi-factor authentication (MFA) where possible on management interfaces to add an additional layer of security. 6. Conduct regular audits of user accounts and permissions within FTSP to detect unauthorized changes. 7. Educate operational technology (OT) and security teams about this vulnerability to ensure rapid incident response. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious token usage patterns. 9. Maintain comprehensive backups of configuration and system states to enable recovery in case of compromise. 10. Coordinate with Rockwell Automation support for guidance and early access to patches or workarounds.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Czech Republic, Spain
CVE-2024-21917: CWE-347 Improper Verification of Cryptographic Signature in Rockwell Automation FactoryTalk® Service Platform
Description
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory. If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.
AI-Powered Analysis
Technical Analysis
CVE-2024-21917 is a critical security vulnerability identified in Rockwell Automation's FactoryTalk® Service Platform (FTSP), a widely used industrial automation software suite. The root cause is an improper verification of cryptographic signatures (CWE-347), specifically the absence of digital signing between the FTSP service token and the directory service. This design flaw allows an attacker to capture or obtain a valid FTSP service token and reuse it to authenticate against a different FTSP directory, effectively bypassing authentication controls. Because the service token is not cryptographically bound to a specific directory, the attacker can impersonate legitimate users or services, gaining unauthorized access. Once authenticated, the attacker can retrieve sensitive user information and modify system settings, potentially disrupting industrial processes or causing data breaches. The vulnerability affects all FTSP versions up to and including 6.31. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's network attack vector, lack of required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a high-risk issue for organizations relying on FTSP for industrial control systems. The vulnerability was publicly disclosed on January 31, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps.
Potential Impact
For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize Rockwell Automation's FactoryTalk® Service Platform, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to sensitive operational data and control settings, potentially causing operational disruptions, safety hazards, and financial losses. The ability to modify system settings without authentication could allow attackers to sabotage industrial processes or cause downtime. Additionally, unauthorized retrieval of user information may lead to further targeted attacks or compliance violations under GDPR due to data breaches. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. The lack of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if mitigations are not applied promptly.
Mitigation Recommendations
1. Immediate upgrade to a patched version of FactoryTalk® Service Platform once Rockwell Automation releases a fix addressing CVE-2024-21917. 2. Until a patch is available, implement network segmentation to isolate FTSP servers from general IT networks and restrict access to trusted hosts only. 3. Employ strict firewall rules and access control lists (ACLs) to limit inbound and lateral traffic to FTSP directories. 4. Monitor network traffic for anomalous authentication attempts or token reuse across different directories. 5. Use multi-factor authentication (MFA) where possible on management interfaces to add an additional layer of security. 6. Conduct regular audits of user accounts and permissions within FTSP to detect unauthorized changes. 7. Educate operational technology (OT) and security teams about this vulnerability to ensure rapid incident response. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious token usage patterns. 9. Maintain comprehensive backups of configuration and system states to enable recovery in case of compromise. 10. Coordinate with Rockwell Automation support for guidance and early access to patches or workarounds.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Rockwell
- Date Reserved
- 2024-01-03T16:40:50.367Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69690c3d4c611209ad3437c5
Added to database: 1/15/2026, 3:48:13 PM
Last enriched: 1/15/2026, 4:02:39 PM
Last updated: 1/15/2026, 5:27:09 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-70305: n/a
UnknownCVE-2026-20076: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Identity Services Engine Software
MediumCVE-2026-20075: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Cisco Cisco Evolved Programmable Network Manager (EPNM)
MediumCVE-2026-20047: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Cisco Cisco Identity Services Engine Software
MediumCVE-2025-70656: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.