A security issue exists within the FactoryTalk Linx Network Browser. By modifying the process.env.NODE_ENV to ‘development’, the attacker can disable FTSP token validation. This bypass allows access to create, update, and delete FTLinx drivers.
References
| Link | Resource |
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1735.html | Vendor Advisory |
Configurations
History
29 Oct 2025, 20:30
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Rockwellautomation
Rockwellautomation factorytalk Linx |
|
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1735.html - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| Summary |
|
|
| CPE | cpe:2.3:a:rockwellautomation:factorytalk_linx:*:*:*:*:*:*:*:* |
14 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-14 15:15
Updated : 2025-10-29 20:30
NVD link : CVE-2025-7972
Mitre link : CVE-2025-7972
CVE.ORG link : CVE-2025-7972
JSON object : View
Products Affected
rockwellautomation
- factorytalk_linx
CWE
CWE-286
Incorrect User Management
