Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9066: CWE-20: Improper Input Validation in Rockwell Automation FactoryTalk ViewPoint

0
High
VulnerabilityCVE-2025-9066cvecve-2025-9066cwe-20
Published: Tue Oct 14 2025 (10/14/2025, 12:15:04 UTC)
Source: CVE Database V5
Vendor/Project: Rockwell Automation
Product: FactoryTalk ViewPoint

Description

A security issue was discovered within FactoryTalk® ViewPoint, allowing unauthenticated attackers to achieve XXE. Certain SOAP requests can be abused to perform XXE, resulting in a temporary denial-of-service.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:00:29 UTC

Technical Analysis

CVE-2025-9066 identifies a critical security flaw in Rockwell Automation's FactoryTalk ViewPoint software, specifically versions 14 and earlier. The vulnerability arises from improper input validation (CWE-20) in the handling of SOAP requests, which enables unauthenticated attackers to conduct XML External Entity (XXE) attacks. XXE attacks exploit the XML parser's ability to process external entities, potentially allowing attackers to access sensitive files, cause denial-of-service (DoS), or perform server-side request forgery (SSRF). In this case, the primary impact is a temporary denial-of-service condition, disrupting the availability of the FactoryTalk ViewPoint service. The vulnerability does not require authentication or user interaction, making it highly accessible to remote attackers over the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity and no privileges or user interaction needed, but with a high impact on availability. Although no public exploits have been reported yet, the nature of the vulnerability and its accessibility make it a significant threat, especially in industrial environments where FactoryTalk ViewPoint is used for monitoring and controlling manufacturing processes. The lack of available patches at the time of disclosure necessitates immediate mitigation strategies to reduce exposure.

Potential Impact

For European organizations, particularly those in manufacturing, energy, and critical infrastructure sectors relying on Rockwell Automation's FactoryTalk ViewPoint, this vulnerability poses a risk of operational disruption through denial-of-service attacks. Temporary service outages can halt monitoring and control capabilities, potentially leading to production downtime, safety risks, and financial losses. Given the unauthenticated and network-accessible nature of the flaw, attackers could exploit it remotely without insider access, increasing the threat surface. The impact on confidentiality and integrity appears limited based on current information, but availability is significantly affected. Disruptions in industrial control systems can have cascading effects on supply chains and critical services, making timely mitigation essential. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as threat actors often develop exploits following public vulnerability disclosures.

Mitigation Recommendations

1. Implement network segmentation and restrict access to FactoryTalk ViewPoint interfaces to trusted management networks only, using firewalls and access control lists to limit exposure. 2. Monitor SOAP traffic for unusual or malformed XML requests that may indicate attempted XXE exploitation. 3. Disable XML external entity processing in the SOAP service configuration if possible, or apply XML parser hardening techniques to prevent external entity resolution. 4. Apply vendor patches or updates as soon as they become available; maintain close communication with Rockwell Automation for security advisories. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting XXE attack patterns. 6. Conduct regular security audits and vulnerability assessments on industrial control systems to identify and remediate similar input validation issues. 7. Develop and test incident response plans specific to industrial control system disruptions to minimize downtime in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Rockwell
Date Reserved
2025-08-15T13:59:29.317Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee4920509368ccaa72488c

Added to database: 10/14/2025, 12:59:12 PM

Last enriched: 10/14/2025, 1:00:29 PM

Last updated: 10/16/2025, 2:08:03 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats