A security issue exists within FactoryTalk Optix MQTT broker due to the lack of URI sanitization. This flaw enables the loading of remote Mosquito plugins, which can be used to achieve remote code execution.
References
| Link | Resource |
|---|---|
| https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1742.html | Vendor Advisory |
Configurations
History
20 Oct 2025, 19:11
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:rockwellautomation:factorytalk_optix:*:*:*:*:*:*:*:* | |
| References | () https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1742.html - Vendor Advisory | |
| First Time |
Rockwellautomation factorytalk Optix
Rockwellautomation |
09 Sep 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-09 13:15
Updated : 2025-10-20 19:11
NVD link : CVE-2025-9161
Mitre link : CVE-2025-9161
CVE.ORG link : CVE-2025-9161
JSON object : View
Products Affected
rockwellautomation
- factorytalk_optix
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
