SB2022033008 - XML External Entity injection in Rockwell Automation software products



SB2022033008 - XML External Entity injection in Rockwell Automation software products

Published: March 30, 2022 Updated: April 11, 2022

Security Bulletin ID SB2022033008
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) XML External Entity injection (CVE-ID: CVE-2022-1018)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within the ccwsln files. A remote attacker can trick a victim to open a specially crafted solution file and view contents of arbitrary files on the system or initiate requests to external systems.

Successful exploitation of the vulnerability may allow an attacker to view contents of arbitrary file on the server or perform network scanning of internal and external infrastructure.


Remediation

Install update from vendor's website.