Lucene search

K
cvelistIcscertCVELIST:CVE-2020-25176
HistoryMar 18, 2022 - 6:00 p.m.

CVE-2020-25176 Rockwell Automation ISaGRAF5 Runtime Relative Path Traversal

2022-03-1818:00:31
CWE-23
icscert
www.cve.org
6
cve-2020-25176
rockwell automation
isagraf5
path traversal
remote code execution

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.009

Percentile

83.4%

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CNA Affected

[
  {
    "product": "ISaGRAF Runtime",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "4.x"
      },
      {
        "status": "affected",
        "version": "5.x"
      }
    ]
  }
]

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.009

Percentile

83.4%

Related for CVELIST:CVE-2020-25176