Advisory

Emerson fixes critical issues in Rosemount Gas Chromatograph

Take action: If you are using Emerson's Rosemount Gas Chromatographs, check that they are isolated from public networks. Then consider patching them in a planned process.


Learn More

Emerson has addressed significant security vulnerabilities in their Rosemount Gas Chromatograph models GC370XA, GC700XA, and GC1500XA.

  • The most critical vulnerability, tracked as CVE-2023-46687 (CVSS score 9.8), allows an unauthenticated attacker with network access to execute arbitrary commands in the root context from a remote location. This poses a significant threat as it could lead to unauthorized access and control over the affected systems.
  • Furthermore, the systems are susceptible to an authentication bypass issue, tracked as CVE-2023-51761 (CVSS score 8.3), which could enable unauthenticated users to gain administrative capabilities.
  •  CVE-2023-49716 (CVSS score 6.9), permits an authenticated user to remotely execute arbitrary commands. This vulnerability, although less severe, still poses a considerable risk.
  • CVE-2023-43609 (CVSS score 6.9) concerns improper authorization that could lead to unauthorized access to sensitive information or cause a denial-of-service condition.

These vulnerabilities are concerning given the deployment of these devices in critical infrastructure sectors like Energy and Chemical industries globally.

Emerson has advised users to update their firmware for these affected products and encourages following current cybersecurity best practices. They emphasize the importance of connecting these devices to secure networks and avoiding direct internet connections. In addition to Emerson's recommendations, the Cybersecurity and Infrastructure Security Agency (CISA) has suggested several defensive measures. These include minimizing network exposure, using firewalls to isolate control systems from business networks, and employing secure methods like updated VPNs for remote access.

Emerson fixes critical issues in Rosemount Gas Chromatograph
{ "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [ { "@type": "Question", "name": "What are the recently identified vulnerabilities in Emerson's Rosemount Gas Chromatographs?", "acceptedAnswer": { "@type": "Answer", "text": "Emerson's Rosemount Gas Chromatograph models GC370XA, GC700XA, and GC1500XA have significant security vulnerabilities. These include CVE-2023-46687 (CVSS score 9.8) allowing remote arbitrary command execution, CVE-2023-51761 (CVSS score 8.3) leading to authentication bypass, CVE-2023-49716 (CVSS score 6.9) permitting remote command execution by authenticated users, and CVE-2023-43609 (CVSS score 6.9) related to improper authorization." } }, { "@type": "Question", "name": "What is the impact of the CVE-2023-46687 vulnerability in Emerson's devices?", "acceptedAnswer": { "@type": "Answer", "text": "The CVE-2023-46687 vulnerability in Emerson's devices is critical, with a CVSS score of 9.8. It allows an unauthenticated attacker with network access to execute arbitrary commands in the root context from a remote location, leading to unauthorized access and control over the affected systems." } }, { "@type": "Question", "name": "What industries are most affected by these vulnerabilities in Emerson's devices?", "acceptedAnswer": { "@type": "Answer", "text": "The vulnerabilities in Emerson's devices are particularly concerning for critical infrastructure sectors such as the Energy and Chemical industries, where these devices are widely deployed globally." } }, { "@type": "Question", "name": "What measures has Emerson recommended for addressing these vulnerabilities?", "acceptedAnswer": { "@type": "Answer", "text": "Emerson has advised users to update their firmware for the affected products and encourages following current cybersecurity best practices. They emphasize the importance of connecting these devices to secure networks and avoiding direct internet connections." } }, { "@type": "Question", "name": "What additional defensive measures has CISA suggested for these vulnerabilities?", "acceptedAnswer": { "@type": "Answer", "text": "The Cybersecurity and Infrastructure Security Agency (CISA) has suggested several defensive measures, including minimizing network exposure, using firewalls to isolate control systems from business networks, and employing secure methods like updated VPNs for remote access." } } ] }