#VU49156 Uncaught Exception in FactoryTalk Linx - CVE-2020-5801

 

#VU49156 Uncaught Exception in FactoryTalk Linx - CVE-2020-5801

Published: December 28, 2020 / Updated: January 29, 2021


Vulnerability identifier: #VU49156
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2020-5801
CWE-ID: CWE-248
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
FactoryTalk Linx
Software vendor:
Rockwell Automation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an uncaught exception when processing OpenNamespace messages. The OpenNamespace message is sent to TCP port 4241 to obtain a session identifier. Subsequent requests require a valid session-id to interact with the service listening on that port. In the OpenNamespace message, the session-id field in the message header should be absent or empty. If a second OpenNamespace request is sent with a valid session-id in it, the CFTLDManager::HandleRequest function in RnaDaSvr.dll loaded in RSLinxNG.exe leads to unhandled exception, resulting in termination of RSLinxNG.exe.

A remote non-authenticated attacker can send a malformed request and crash the RSLinxNG.exe service.


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links