Skip to content
  Tuesday 20 January 2026
Trending
May 13, 2024Senior Cybersecurity Analyst (TS/SCI) February 1, 2024Senior Manager, Cybersecurity April 25, 2023Abuse of the Service Location Protocol May Lead to DoS Attacks April 15, 2024Joint Guidance on Deploying AI Systems Securely March 18, 2025As humans, we have an innate desire to seek out and form connections with others. Whether it be through friendships, romantic relationships, or familial bonds, these connections play a vital role in our overall well-being and happiness. Studies have shown that individuals with strong social connections are more likely to live longer, have better mental health, and experience a higher quality of life.<br /> <br /> The benefits of social connections can be seen in various aspects of our lives. For example, having a strong support system can help us navigate through difficult times and provide us with emotional comfort and stability. Additionally, forming connections with others allows us to share experiences, ideas, and perspectives, enriching our lives and broadening our understanding of the world around us.<br /> <br /> In today’s fast-paced world, it can be easy to neglect our social connections in favor of work, technology, or other distractions. However, it is important to prioritize building and maintaining these relationships, as they are essential for our overall well-being. Taking the time to connect with others, whether it be through face-to-face interactions, phone calls, or virtual communication, can have a profound impact on our mental and emotional health.<br /> <br /> In order to cultivate strong social connections, it is important to be open and vulnerable with those around us. By sharing our thoughts, feelings, and experiences with others, we can deepen our relationships and create a sense of intimacy and trust. Additionally, being a good listener and showing empathy towards others can help strengthen our connections and foster a sense of mutual understanding and support.<br /> <br /> Ultimately, forming and nurturing social connections is a fundamental aspect of what it means to be human. By prioritizing our relationships with others and investing time and effort into building strong connections, we not only enhance our own well-being but also contribute to the greater sense of community and interconnectedness in the world. So, let us cherish and cultivate our social connections, as they are truly the cornerstone of a fulfilling and meaningful life. June 5, 2025In today’s fast-paced world, it can be easy to feel overwhelmed by the constant barrage of information and demands on our time. It’s no wonder that stress and anxiety are on the rise, with many people struggling to find a balance between work, family, and personal responsibilities. However, it’s important to remember that taking care of our mental health is just as crucial as caring for our physical well-being.<br /> <br /> One way to combat stress and anxiety is to practice mindfulness. This involves being fully present in the moment and paying attention to our thoughts and feelings without judgment. By practicing mindfulness regularly, we can learn to manage our stress levels more effectively and cultivate a sense of peace and calm in our daily lives.<br /> <br /> Another important aspect of mental health is self-care. This means taking the time to prioritize our own well-being and engage in activities that bring us joy and relaxation. Whether it’s going for a walk in nature, practicing yoga, or spending time with loved ones, self-care is essential for maintaining a healthy mind and body.<br /> <br /> It’s also important to seek support when needed. Talking to a trusted friend, family member, or mental health professional can provide valuable insight and guidance during difficult times. Remember, it’s not a sign of weakness to ask for help – in fact, it takes courage and strength to reach out for support.<br /> <br /> Overall, taking care of our mental health is a lifelong journey that requires dedication and effort. By practicing mindfulness, engaging in self-care activities, and seeking support when needed, we can cultivate a sense of well-being and resilience that will help us navigate life’s challenges with grace and strength. Remember, you are not alone – there are resources and people available to support you on your mental health journey. January 16, 2025Account Executive – Secureworks Cybersecurity Sales – US Remote (Bay Area) January 23, 2024Senior Cybersecurity Analyst December 1, 2024Cybersecurity Architect September 14, 2023RMF Cybersecurity Analyst
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Rockwell Automation FactoryTalk Historian SE
Threat Advisories

Rockwell Automation FactoryTalk Historian SE

SecuredyouadmSecuredyouadm—May 9, 20240
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 7.7
  • ATTENTION: Exploitable remotely/low attack complexity
  • Vendor: Rockwell Automation
  • Equipment: FactoryTalk Historian SE
  • Vulnerabilities: Missing Release of Resource after Effective Lifetime, Improper Check or Handling of Exceptional Conditions

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Rockwell Automation FactoryTalk Historian SE, a data management application, are affected:

  • FactoryTalk Historian SE: Versions v9.0 and prior

3.2 Vulnerability Overview

3.2.1 MISSING RELEASE OF RESOURCE AFTER EFFECTIVE LIFETIME CWE-772

FactoryTalk Historian SE utilizes the AVEVA PI Server, which contains a vulnerability that could allow an unauthenticated user to cause a partial denial-of-service condition in the PI Message Subsystem of a PI Server by consuming available memory. This vulnerability exists in FactoryTalk Historian SE versions 9.0 and earlier. Exploitation of this vulnerability could cause FactoryTalk Historian SE to become unavailable, requiring a power cycle to recover it.

CVE-2023-31274 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A CVSS v4 score has also been calculated for CVE-2023-31274. A base score of 7.7 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H).

3.2.2 IMPROPER CHECK OR HANDLING OF EXCEPTIONAL CONDITIONS CWE-703

FactoryTalk Historian SE uses the AVEVA PI Server, which contains a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition. This vulnerability exists in FactoryTalk Historian SE versions 9.0 and earlier. Exploitation of this vulnerability could cause FactoryTalk Historian SE to become unavailable, requiring a power cycle to recover it.

CVE-2023-34348 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

More stories

Integration Objects OPC UA Server Toolkit

January 16, 2024

Lantronix Provisioning Manager | CISA

July 22, 2025

FBI and CISA Release #StopRansomware: Royal Ransomware

March 6, 2023

CISA Adds One Known Exploited Vulnerability to Catalog

February 13, 2024

A CVSS v4 score has also been calculated for CVE-2023-34348. A base score of 7.7 has been calculated; the CVSS vector string is (CVSS4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United States

3.4 RESEARCHER

Rockwell Automation reported these vulnerabilities to CISA.

4. MITIGATIONS

Rockwell Automation has released product updates addressing this vulnerability:

  • FactoryTalk Historian SE: Users using the affected software are encouraged to install FactoryTalk Historian SE version 9.01 or higher as soon as feasible.

For more information, see Rockwell Automation’s article.(Login Required)

For more information about the AVEVA PI and AVEVA Edge products, see AVEVA-2024-001 and AVEVA-2024-002

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.

5. UPDATE HISTORY

  • May 09, 2024: Initial Publication



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

CISA Releases Four Industrial Control Systems Advisories
Delta Electronics InfraSuite Device Master
Related posts
  • Related posts
  • More from author
Threat Advisories

Siemens RUGGEDCOM ROS | CISA

January 16, 20260
Threat Advisories

Siemens TeleControl Server Basic | CISA

January 16, 20260
Threat Advisories

Siemens SIMATIC and SIPLUS products

January 16, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures