Vulnerability identifier: #VU28996
Vulnerability risk: Medium
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
FactoryTalk Linx
Server applications /
SCADA systems
RSLinx Classic
Server applications /
SCADA systems
Vendor: Rockwell Automation
Description
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to the parsing mechanism that processes certain file types does not provide input sanitation. A remote authenticated attacker can use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.
The following products that utilize FactoryTalk Linx Software are affected:
Mitigation
Install updates from vendor's website.
Vulnerable software versions
FactoryTalk Linx: 6.00 - 6.11
RSLinx Classic: 4.11.00
External links
http://ics-cert.us-cert.gov/advisories/icsa-20-163-02
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.