CVE-2025-7972
BaseFortify
Publication date: 2025-08-14
Last updated on: 2025-10-29
Assigner: Rockwell Automation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rockwellautomation | factorytalk_linx | to 6.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-286 | The product does not properly manage a user within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the FactoryTalk Linx Network Browser. By changing the environment variable process.env.NODE_ENV to 'development', an attacker can disable the FTSP token validation mechanism. This bypass allows the attacker to create, update, and delete FTLinx drivers without proper authorization.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to gain unauthorized access to critical functions within the FactoryTalk Linx Network Browser, such as creating, updating, and deleting FTLinx drivers. This could lead to disruption of industrial control processes, potential manipulation of system behavior, and compromise of system integrity.