Lucene search

K
cve[email protected]CVE-2023-2071
HistorySep 12, 2023 - 2:15 p.m.

CVE-2023-2071

2023-09-1214:15:09
CWE-434
CWE-20
web.nvd.nist.gov
16
cve-2023-2071
rockwell automation
factorytalk view machine edition
panelview plus
remote code execution
vulnerability
security
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

Affected configurations

NVD
Node
rockwellautomationpanelview_plusMatch-
AND
rockwellautomationfactorytalk_viewRange13.0machine

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Fa",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "<=13.0"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.6%

Related for CVE-2023-2071