The part number 1756-L84ESK is associated with the Rockwell Automation FactoryTalk Remote Access (FTRA) product, which is a software solution that allows remote access to industrial control systems. The security advisory published on May 14, 2024, highlights a vulnerability in the FTRA software that could lead to remote code execution if exploited.
Technical Specifications:
The FTRA software is affected by an unquoted executable path vulnerability that could allow a threat actor to enter a malicious executable and run it as a System user. This vulnerability is present in software versions prior to v13.6 and affects the FTRA product.
Alarm/Error Codes:
The advisory does not provide specific information on alarm or error codes related to this vulnerability. However, it does recommend applying security best practices and upgrading to a corrected version of the software to mitigate the risk.
User Manuals:
The security advisory does not provide direct links to user manuals for the FTRA software. However, users can access the Rockwell Automation website for more detailed documentation and support resources.
Troubleshooting:
The advisory does not provide specific troubleshooting steps for this vulnerability. However, users are encouraged to apply security best practices and upgrade to a corrected version of the software to mitigate the risk.
Programming:
The advisory does not provide specific information on programming the FTRA software. However, users can access the Rockwell Automation website for more detailed documentation and support resources on programming the FTRA.
Installation:
The advisory does not provide specific information on installing the FTRA software. However, users can access the Rockwell Automation website for more detailed documentation and support resources on installing the FTRA.
In summary, the part number 1756-L84ESK is associated with the Rockwell Automation FactoryTalk Remote Access (FTRA) software, which has a vulnerability that could lead to remote code execution if exploited. Users are encouraged to upgrade to a corrected version of the software and apply security best practices to mitigate the risk.
Go to product