Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21917: CWE-347 Improper Verification of Cryptographic Signature in Rockwell Automation FactoryTalk® Service Platform

0
Critical
VulnerabilityCVE-2024-21917cvecve-2024-21917cwe-347
Published: Wed Jan 31 2024 (01/31/2024, 18:16:27 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk® Service Platform

Description

A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.

AI-Powered Analysis

AILast updated: 01/15/2026, 16:02:39 UTC

Technical Analysis

CVE-2024-21917 is a critical security vulnerability identified in Rockwell Automation's FactoryTalk® Service Platform (FTSP), a widely used industrial automation software suite. The root cause is an improper verification of cryptographic signatures (CWE-347), specifically the absence of digital signing between the FTSP service token and the directory service. This design flaw allows an attacker to capture or obtain a valid FTSP service token and reuse it to authenticate against a different FTSP directory, effectively bypassing authentication controls. Because the service token is not cryptographically bound to a specific directory, the attacker can impersonate legitimate users or services, gaining unauthorized access. Once authenticated, the attacker can retrieve sensitive user information and modify system settings, potentially disrupting industrial processes or causing data breaches. The vulnerability affects all FTSP versions up to and including 6.31. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's network attack vector, lack of required privileges or user interaction, and complete compromise of confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a high-risk issue for organizations relying on FTSP for industrial control systems. The vulnerability was publicly disclosed on January 31, 2024, and no official patches have been linked yet, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize Rockwell Automation's FactoryTalk® Service Platform, this vulnerability poses a significant risk. Exploitation can lead to unauthorized access to sensitive operational data and control settings, potentially causing operational disruptions, safety hazards, and financial losses. The ability to modify system settings without authentication could allow attackers to sabotage industrial processes or cause downtime. Additionally, unauthorized retrieval of user information may lead to further targeted attacks or compliance violations under GDPR due to data breaches. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. The lack of authentication requirements and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation if mitigations are not applied promptly.

Mitigation Recommendations

1. Immediate upgrade to a patched version of FactoryTalk® Service Platform once Rockwell Automation releases a fix addressing CVE-2024-21917. 2. Until a patch is available, implement network segmentation to isolate FTSP servers from general IT networks and restrict access to trusted hosts only. 3. Employ strict firewall rules and access control lists (ACLs) to limit inbound and lateral traffic to FTSP directories. 4. Monitor network traffic for anomalous authentication attempts or token reuse across different directories. 5. Use multi-factor authentication (MFA) where possible on management interfaces to add an additional layer of security. 6. Conduct regular audits of user accounts and permissions within FTSP to detect unauthorized changes. 7. Educate operational technology (OT) and security teams about this vulnerability to ensure rapid incident response. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious token usage patterns. 9. Maintain comprehensive backups of configuration and system states to enable recovery in case of compromise. 10. Coordinate with Rockwell Automation support for guidance and early access to patches or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Rockwell
Date Reserved
2024-01-03T16:40:50.367Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69690c3d4c611209ad3437c5

Added to database: 1/15/2026, 3:48:13 PM

Last enriched: 1/15/2026, 4:02:39 PM

Last updated: 1/15/2026, 5:27:09 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats