Lucene search

K
cvelistIcscertCVELIST:CVE-2020-25176
HistoryMar 18, 2022 - 6:00 p.m.

CVE-2020-25176 Rockwell Automation ISaGRAF5 Runtime Relative Path Traversal

2022-03-1818:00:31
CWE-23
icscert
www.cve.org

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.7%

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

CNA Affected

[
  {
    "product": "ISaGRAF Runtime",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "4.x"
      },
      {
        "status": "affected",
        "version": "5.x"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.7%

Related for CVELIST:CVE-2020-25176