CVE-2025-9064
Rockwell Automation FactoryTalk View Machine Edition vulnerability analysis and mitigation

Overview

A path traversal security vulnerability (CVE-2025-9064) was discovered in FactoryTalk View Machine Edition, affecting versions prior to V15.00. The vulnerability was identified during internal testing by Rockwell Automation and publicly disclosed on October 14, 2025. This security issue affects FactoryTalk View Machine Edition, a machine-level HMI software used for industrial automation that enables design, monitoring, and control of operator interfaces (Rockwell Advisory).

Technical details

The vulnerability is classified as a path traversal issue (CWE-22: Improper Limitation of a Pathname to a Restricted Directory). It received a CVSS v3.1 base score of 7.5 (High) and a CVSS v4.0 base score of 8.7 (High). The technical nature of the vulnerability allows unauthenticated attackers on the same network as the device to delete any file within the panel's operating system, though exploitation requires knowledge of the specific filenames to be deleted (CISA Advisory, Rockwell Advisory).

Impact

The successful exploitation of this vulnerability could allow attackers to delete arbitrary files within the panel's operating system, potentially leading to system corruption or data loss. The attack can be executed by any unauthenticated attacker who has network access to the affected device, making it particularly concerning for industrial environments (Security Online).

Mitigation and workarounds

Rockwell Automation has released several remediation options for affected systems. Users can upgrade to FactoryTalk View ME V15.00 or later on ASEM 6300 IPCs, apply Patch BF31001, or install the PanelView Plus 7 Performance Series B V14.103 firmware package. For users unable to upgrade, Rockwell Automation recommends following their security best practices, including network segmentation and access restrictions (Rockwell Advisory).

Additional resources


SourceThis report was generated using AI

Related Rockwell Automation FactoryTalk View Machine Edition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-2071CRITICAL9.8
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesSep 12, 2023
CVE-2025-9064HIGH8.7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoNoOct 14, 2025
CVE-2025-9063HIGH7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoNoOct 14, 2025
CVE-2024-37365HIGH7
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesNov 12, 2024
CVE-2024-21914MEDIUM5.3
  • Rockwell Automation FactoryTalk View Machine EditionRockwell Automation FactoryTalk View Machine Edition
  • cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*
NoYesMar 25, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management