Multiple vulnerabilities in Rockwell Automation FactoryTalk Linx Software



Published: 2020-06-12
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-11999
CVE-2020-12001
CVE-2020-12003
CVE-2020-12005
CWE-ID CWE-20
CWE-22
CWE-434
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
FactoryTalk Linx
Server applications / SCADA systems

RSLinx Classic
Server applications / SCADA systems

Vendor Rockwell Automation

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU28995

Risk: Medium

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11999

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to an exposed API call allows users to provide files to be processed without sanitation. A remote authenticated attacker can specify a filename to execute arbitrary code and modify files or data.

The following products that utilize FactoryTalk Linx Software are affected:

  • Connected Components Workbench: Version 12 and prior
  • ControlFLASH: Version 14 and later
  • ControlFLASH Plus: Version 1 and later
  • FactoryTalk Asset Centre: Version 9 and later
  • FactoryTalk Linx CommDTM: Version 1 and later
  • Studio 5000 Launcher: Version 31 and later
  • Studio 5000 Logix Designer software: Version 32 and prior

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FactoryTalk Linx: 6.00 - 6.11

RSLinx Classic: 4.11.00


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsa-20-163-02

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU28996

Risk: Medium

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12001

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to the parsing mechanism that processes certain file types does not provide input sanitation. A remote authenticated attacker can use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.

The following products that utilize FactoryTalk Linx Software are affected:

  • Connected Components Workbench: Version 12 and prior
  • ControlFLASH: Version 14 and later
  • ControlFLASH Plus: Version 1 and later
  • FactoryTalk Asset Centre: Version 9 and later
  • FactoryTalk Linx CommDTM: Version 1 and later
  • Studio 5000 Launcher: Version 31 and later
  • Studio 5000 Logix Designer software: Version 32 and prior

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FactoryTalk Linx: 6.00 - 6.11

RSLinx Classic: 4.11.00


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsa-20-163-02

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Path Traversal

EUVDB-ID: #VU28997

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12003

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the local hard drive.

The following products that utilize FactoryTalk Linx Software are affected:

  • Connected Components Workbench: Version 12 and prior
  • ControlFLASH: Version 14 and later
  • ControlFLASH Plus: Version 1 and later
  • FactoryTalk Asset Centre: Version 9 and later
  • FactoryTalk Linx CommDTM: Version 1 and later
  • Studio 5000 Launcher: Version 31 and later
  • Studio 5000 Logix Designer software: Version 32 and prior

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FactoryTalk Linx: 6.00 - 6.11

RSLinx Classic: 4.11.00


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsa-20-163-02

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Arbitrary file upload

EUVDB-ID: #VU28998

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12005

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload within the communication function. A remote attacker can upload a file with bad compression, consuming all the available CPU resources, leading to a denial-of-service condition.

The following products that utilize FactoryTalk Linx Software are affected:

  • Connected Components Workbench: Version 12 and prior
  • ControlFLASH: Version 14 and later
  • ControlFLASH Plus: Version 1 and later
  • FactoryTalk Asset Centre: Version 9 and later
  • FactoryTalk Linx CommDTM: Version 1 and later
  • Studio 5000 Launcher: Version 31 and later
  • Studio 5000 Logix Designer software: Version 32 and prior

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FactoryTalk Linx: 6.00 - 6.11

RSLinx Classic: 4.11.00


CPE2.3 External links

http://ics-cert.us-cert.gov/advisories/icsa-20-163-02

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###