#VU28996 Input validation error in FactoryTalk Linx and RSLinx Classic


Published: 2020-06-12

Vulnerability identifier: #VU28996

Vulnerability risk: Medium

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12001

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
FactoryTalk Linx
Server applications / SCADA systems
RSLinx Classic
Server applications / SCADA systems

Vendor: Rockwell Automation

Description

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to the parsing mechanism that processes certain file types does not provide input sanitation. A remote authenticated attacker can use specially crafted files to traverse the file system and modify or expose sensitive data or execute arbitrary code.

The following products that utilize FactoryTalk Linx Software are affected:

  • Connected Components Workbench: Version 12 and prior
  • ControlFLASH: Version 14 and later
  • ControlFLASH Plus: Version 1 and later
  • FactoryTalk Asset Centre: Version 9 and later
  • FactoryTalk Linx CommDTM: Version 1 and later
  • Studio 5000 Launcher: Version 31 and later
  • Studio 5000 Logix Designer software: Version 32 and prior

Mitigation
Install updates from vendor's website.

Vulnerable software versions

FactoryTalk Linx: 6.00 - 6.11

RSLinx Classic: 4.11.00


External links
http://ics-cert.us-cert.gov/advisories/icsa-20-163-02


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability