Loading

Studio 5000 ® Simulation Interface - Multiple Vulnerabilities

Advisory ID:
SD1760
發佈日期:
November 11, 2025
最近更新:
November 11, 2025
Revision Number:
1.0
Known Exploited Vulnerability (KEV):
否
Corrected:
是
Workaround:
否
CVE IDs
CVE-2025-11696,
CVE-2025-11697
下載
The following link(s) provide the security advisory in Vulnerability Exploitability Exchange format:
JSON
JSON
摘要

The security of our products is important to us as your industrial automation supplier. This security issue was found internally during routine testing and is being reported based on our commitment to customer transparency and improvement of all business environments.

Product Description

Studio 5000® is Rockwell Automation’s integrated design environment for developing, programming, and managing industrial automation systems using Logix 5000® controllers.

Affected Products and Solution

Affected Product

CVE

Affected Software Version

Corrected in Software Version

Studio 5000® Simulation Interface™

CVE-2025-11696

2.02 and prior

3.0.0

Studio 5000® Simulation Interface™

CVE-2025-11697

2.02 and prior

3.0.0

Security Issue Details for CVE-2025-11696

Category

Details

CVE ID

CVE-2025-11696

Impact

A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.

CVSS 3.1 Base Score

8.1/10

CVSS 4.0 Base Score

8.9/10

CWE

CWE-918: Server-Side Request Forgery (SSRF)

Known Exploited Vulnerability

No (Not listed in KEV database)

 

Security Issue Details for CVE-2025-11697

Category

Details

CVE ID

CVE-2025-11697

Impact

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

CVSS 3.1 Base Score

8.1/10

CVSS 4.0 Base Score

8.9/10

CWE

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Known Exploited Vulnerability

No

Mitigations and Workarounds
Customers using the affected software, who are not able to upgrade to one of the corrected versions, should use our security best practices. 

Revision History

Revision

Date

Description

1.0

November 11, 2025

Initial release

Glossary:

·         Server-Side Request Forgery (SSRF): A security vulnerability that allows an attacker to make the server send requests to unintended locations, potentially exposing internal resources or sensitive data.

·         API: Application Programming Interface (API) is a set of protocols and tools that allow different software applications to communicate with each other.

·         Endpoint: A specific URL or address in an API where requests are sent and responses are received, representing a distinct function or resource.

·         SMB: Server Message Block, a protocol used for sharing files, printers, and other resources over a network.

·         NTLM: NT Lan Manager, Windows authentication protocol.

 

Get Up-to-Date Product Security Information

Visit the Rockwell Automation security advisories on the Trust Center page to:

·         Subscribe to product security alerts

·         Review the current list of Rockwell Automation security advisories

·         Report a possible security issue in a Rockwell Automation product

·         Learn more about the vulnerability policy

Support

If you have any questions regarding the security issue(s) above and how to mitigate them, contact TechConnect for help. More information can be found at Contact Us | Rockwell Automation | US.

If you have any questions regarding this disclosure, please contact PSIRT
Email: rasecure@ra.rockwell.com

Legal Disclaimer

ROCKWELL AUTOMATION DOES NOT WARRANT THE COMPLETENESS, TIMELINESS OR ACCURACY OF ANY OF THE DATA CONTAINED IN THIS WEB SITE AND MAY MAKE CHANGES THERETO AT ANY TIME IN ITS SOLE DISCRETION WITHOUT NOTICE. FURTHER, ALL INFORMATION CONVEYED HEREBY IS PROVIDED TO USERS "AS IS." IN NO EVENT SHALL ROCKWELL BE LIABLE FOR ANY DAMAGES OF ANY KIND INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS PROFIT OR DAMAGE, EVEN IF ROCKWELL AUTOMATION HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGES. ROCKWELL AUTOMATION DISCLAIMS ALL WARRANTIES WHETHER EXPRESSED OR IMPLIED IN RESPECT OF THE INFORMATION (INCLUDING SOFTWARE) PROVIDED HEREBY, INCLUDING THE IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, AND NON-INFRINGEMENT. Note that certain jurisdictions do not countenance the exclusion of implied warranties; thus, this disclaimer may not apply to you.

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation 首頁
  2. Chevron LeftChevron Left Trust Center
  3. Chevron LeftChevron Left Industrial Security Adv
  4. Chevron LeftChevron Left Industrial Security Advisory Detail
請更新您的 cookie 設定以繼續.
此功能需要 cookie 來改善您的體驗。請更新您的設定以允許這些 cookie:
  • 社群媒體Cookie
  • 功能Cookie
  • 性能Cookie
  • 行銷Cookie
  • 全部Cookie
您可以隨時更新您的設定。想了解更多訊息,請參閱我們的 {0} 隱私政策
CloseClose