CVE-2025-9067: CWE-269: Improper Privilege Management in Rockwell Automation FactoryTalk Linx
A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
AI Analysis
Technical Summary
CVE-2025-9067 is a vulnerability classified under CWE-269 (Improper Privilege Management) affecting Rockwell Automation's FactoryTalk Linx software, specifically versions 6.40 and earlier. The flaw resides in the x86 Microsoft Installer (MSI) file used by FTLinx. Authenticated attackers with valid Windows credentials can initiate a repair operation on the MSI installation. During this repair process, the attacker can hijack the console window that appears, enabling them to spawn a command prompt with SYSTEM-level privileges. This escalation bypasses normal privilege boundaries, granting the attacker unrestricted access to the system, including all files, processes, and system resources. The vulnerability requires local access and valid user credentials but does not require additional user interaction or elevated privileges initially. The CVSS 4.0 base score is 8.5, reflecting high severity due to the ease of exploitation after authentication and the critical impact on confidentiality, integrity, and availability. No patches have been linked yet, and no known exploits have been reported in the wild, but the vulnerability represents a significant risk in industrial control systems environments where FactoryTalk Linx is deployed.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that utilize Rockwell Automation's FactoryTalk Linx, this vulnerability could lead to full system compromise. Attackers gaining SYSTEM-level access can manipulate industrial control processes, disrupt operations, steal sensitive operational data, or cause physical damage by altering control commands. The impact extends to operational technology (OT) environments where FactoryTalk Linx acts as a communication interface between control devices and supervisory systems. Given the critical nature of industrial automation in European economies, exploitation could result in significant operational downtime, safety hazards, regulatory non-compliance, and financial losses. The requirement for valid Windows credentials limits remote exploitation but insider threats or compromised user accounts could be leveraged. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
European organizations should immediately audit and restrict access to systems running FactoryTalk Linx, ensuring only trusted users have Windows credentials capable of initiating MSI repairs. Implement strict user account management and monitor for unusual repair operations or console window hijacking attempts. Employ application whitelisting and endpoint detection to identify suspicious command prompt launches with SYSTEM privileges. Since no official patches are currently available, consider isolating FactoryTalk Linx systems from general IT networks and enforcing network segmentation to limit lateral movement. Regularly review and harden Windows Installer permissions and consider disabling MSI repair functionality if feasible. Engage with Rockwell Automation for updates and apply patches promptly once released. Additionally, conduct user training to recognize and report suspicious activities related to privilege escalation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2025-9067: CWE-269: Improper Privilege Management in Rockwell Automation FactoryTalk Linx
Description
A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.
AI-Powered Analysis
Technical Analysis
CVE-2025-9067 is a vulnerability classified under CWE-269 (Improper Privilege Management) affecting Rockwell Automation's FactoryTalk Linx software, specifically versions 6.40 and earlier. The flaw resides in the x86 Microsoft Installer (MSI) file used by FTLinx. Authenticated attackers with valid Windows credentials can initiate a repair operation on the MSI installation. During this repair process, the attacker can hijack the console window that appears, enabling them to spawn a command prompt with SYSTEM-level privileges. This escalation bypasses normal privilege boundaries, granting the attacker unrestricted access to the system, including all files, processes, and system resources. The vulnerability requires local access and valid user credentials but does not require additional user interaction or elevated privileges initially. The CVSS 4.0 base score is 8.5, reflecting high severity due to the ease of exploitation after authentication and the critical impact on confidentiality, integrity, and availability. No patches have been linked yet, and no known exploits have been reported in the wild, but the vulnerability represents a significant risk in industrial control systems environments where FactoryTalk Linx is deployed.
Potential Impact
For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors that utilize Rockwell Automation's FactoryTalk Linx, this vulnerability could lead to full system compromise. Attackers gaining SYSTEM-level access can manipulate industrial control processes, disrupt operations, steal sensitive operational data, or cause physical damage by altering control commands. The impact extends to operational technology (OT) environments where FactoryTalk Linx acts as a communication interface between control devices and supervisory systems. Given the critical nature of industrial automation in European economies, exploitation could result in significant operational downtime, safety hazards, regulatory non-compliance, and financial losses. The requirement for valid Windows credentials limits remote exploitation but insider threats or compromised user accounts could be leveraged. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
European organizations should immediately audit and restrict access to systems running FactoryTalk Linx, ensuring only trusted users have Windows credentials capable of initiating MSI repairs. Implement strict user account management and monitor for unusual repair operations or console window hijacking attempts. Employ application whitelisting and endpoint detection to identify suspicious command prompt launches with SYSTEM privileges. Since no official patches are currently available, consider isolating FactoryTalk Linx systems from general IT networks and enforcing network segmentation to limit lateral movement. Regularly review and harden Windows Installer permissions and consider disabling MSI repair functionality if feasible. Engage with Rockwell Automation for updates and apply patches promptly once released. Additionally, conduct user training to recognize and report suspicious activities related to privilege escalation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Rockwell
- Date Reserved
- 2025-08-15T14:19:50.492Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ee4920509368ccaa72488f
Added to database: 10/14/2025, 12:59:12 PM
Last enriched: 10/14/2025, 1:00:44 PM
Last updated: 10/15/2025, 11:21:07 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11619: CWE-295 Improper Certificate Validation in Devolutions Devolutions Server
HighCVE-2025-43313: An app may be able to access sensitive user data in Apple macOS
MediumCVE-2025-43282: An app may be able to cause unexpected system termination in Apple iPadOS
MediumCVE-2025-43281: A local attacker may be able to elevate their privileges in Apple macOS
UnknownCVE-2025-43280: Forwarding an email could display remote images in Mail in Lockdown Mode in Apple iOS and iPadOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.