Advisory

Rockwell Automation patches two critical vulnerabilities in Pavilion8

Take action: If you are running Rockwell Automation Pavilion8, make sure it's isolated in a secure network and not accessible from the internet. Then patch ASAP, because two critical flaws will eventually be exploited.


Learn More

Rockwell Automation has issued security updates to patch two critical vulnerabilities affecting its Pavilion8 advanced process control product.

Rockwell Automation's Pavilion8 is a  Model Predictive Control (MPC) platform used to optimize industrial processes. Pavilion8 is widely used across various industries, including chemicals, food and beverage, and cement production to manage complex systems and improve decision-making.

Details of the Vulnerabilities:

  1. CVE-2024-7960 (CVSS score 9.1) - This vulnerability could allow unauthorized attackers to access sensitive information and modify configuration settings without proper authorization. Exploiting this flaw could potentially compromise the system's integrity.

  2. CVE-2024-7961 (CVSS score 9.8) - This path traversal vulnerability allows attackers to perform remote code execution by uploading arbitrary files to the server. It enables attackers to take full control of affected systems.

These vulnerabilities impact Pavilion8 versions prior to 5.20

Users and administrators of affected Rockwell Automation products are strongly encouraged to update to the latest version of Pavilion8 immediately to mitigate these security risks.

Rockwell Automation patches two critical vulnerabilities in Pavilion8