Loading

FactoryTalk® Linx Privilege Escalation Vulnerabilities 

Severity:
High
Advisory ID:
SD1754
发布日期:
October 14, 2025
上次更新时间:
October 14, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
否
Corrected:
否
Workaround:
是
CVE IDs
CVE-2025-9067 ,
CVE-2025-9068
下载
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
摘要

FactoryTalk® Linx Privilege Escalation Vulnerabilities

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

 

Product Description

FactoryTalk Linx is a modern, secure communications platform that delivers real-time control system data from Allen-Bradley devices to FactoryTalk and third-party software, optimized for Logix 5000 controllers and scalable from small setups to large distributed systems.

 

Affected products and solution

Affected Product

CVE

Affected Software Version

Corrected in Software Version

FactoryTalk Linx

CVE-2025-9067

6.40 and prior

6.50 and later

FactoryTalk Linx

CVE-2025-9068

6.40 and prior

6.50 and later

 

Security Issue Details

Category

Details

CVE ID

CVE-2025-9067

Impact

A security issue exists within the x86 Microsoft Installer File (MSI), installed with FTLinx. Authenticated attackers with valid Windows user credentials can initiate a repair and hijack the resulting console window. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

CVSS 3.1 Base Score

7.8/10

CVSS 4.0 Base Score

8.5/10

CWEs

CWE-268: Privilege Chaining

Known Exploited Vulnerability

No (Not listed in KEV database)

 

 

Category

Details

CVE ID

CVE-2025-9068

Impact

A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

CVSS 3.1 Base Score

7.8/10

CVSS 4.0 Base Score

8.5/10

CWEs

CWE-268: Privilege Chaining

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Mitigations and Workarounds

Customers using the affected software should consider installing the Microsoft patch to address the MSI issue and upgrade to version 6.50 or later if possible. Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices.

 

Revision History

Revision

Date

Description

1.0

 October 14, 2025

Initial release

 

 Glossary

·         MSI: Windows Installer package used to install, update, or remove software on Windows Systems

·         SYSTEM-level privileges: access or execution rights equivalent to the Windows operating system's highest authority, allowing full control over all processes, files, and configurations.

 

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the Rockwell Automation vulnerability policy

 

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

 

If you have any questions regarding this disclosure, please contact PSIRT

Email: rasecure@ra.rockwell.com

 

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation 主页 Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
请更新您的Cookies偏好以继续.
此功能需要Cookies来增强您的体验。请更新您的系统偏好以允许使用这些Cookies:
  • 社交媒体Cookies
  • 功能Cookies
  • 性能 Cookies
  • 市场营销Cookies
  • 所有Cookies
您可以随时更新您的系统偏好。如需了解更多信息,请参阅我们的 {0} 隐私政策
CloseClose