A security issue exists within FactoryTalk Optix MQTT broker due to the lack of URI sanitization. This flaw enables the loading of remote Mosquito plugins, which can be used to achieve remote code execution.
References
| Link | Resource |
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1742.html | Vendor Advisory |
Configurations
History
20 Oct 2025, 19:11
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rockwellautomation factorytalk Optix
Rockwellautomation |
|
| CPE | cpe:2.3:a:rockwellautomation:factorytalk_optix:*:*:*:*:*:*:*:* | |
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1742.html - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
09 Sep 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-09 13:15
Updated : 2025-10-20 19:11
NVD link : CVE-2025-9161
Mitre link : CVE-2025-9161
CVE.ORG link : CVE-2025-9161
JSON object : View
Products Affected
rockwellautomation
- factorytalk_optix
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
