CVE-2024-37365
Rockwell Automation FactoryTalk View Machine Edition vulnerability analysis and mitigation

Overview

A remote code execution vulnerability (CVE-2024-37365) was discovered in FactoryTalk View ME versions 14 and above. The vulnerability was identified internally during routine testing and disclosed on November 12, 2024. The issue affects the project save functionality within the software, specifically when using default folder privileges (Rockwell Advisory, NVD).

Technical details

The vulnerability stems from improper input validation (CWE-20) in the project save functionality. It received a CVSS v3.1 base score of 7.3 (High) and a CVSS v4.0 score of 7.0 (High). The CVSS v3.1 vector string is AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H, indicating that the vulnerability requires local access and user interaction to exploit (Rockwell Advisory).

Impact

The vulnerability allows users to save projects within the public directory, enabling anyone with local access to modify or delete files. Furthermore, a malicious user could potentially leverage this vulnerability to escalate their privileges by changing the macro to execute arbitrary code (NVD, Rockwell Advisory).

Mitigation and workarounds

The vulnerability has been fixed in FactoryTalk View ME version 15. For users unable to upgrade, Rockwell Automation recommends hardening the Windows OS by removing the INTERACTIVE group from the folder's security properties and adding specific users or user groups with least privilege permissions. Users with read-only permission can still test run and run the FactoryTalk View ME Station. Detailed guidance can be found in FactoryTalk View ME v14 Help topic: 'HMI projects folder settings' (Rockwell Advisory).

Additional resources


SourceThis report was generated using AI

Related Rockwell Automation FactoryTalk View Machine Edition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-2071CRITICAL9.8
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesSep 12, 2023
CVE-2025-9064HIGH8.7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoNoOct 14, 2025
CVE-2025-9063HIGH7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoNoOct 14, 2025
CVE-2024-37365HIGH7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesNov 12, 2024
CVE-2024-21914MEDIUM5.3
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesMar 25, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management