Lucene search

K
cvelistIcscertCVELIST:CVE-2021-27473
HistoryMar 23, 2022 - 7:46 p.m.

CVE-2021-27473 Rockwell Automation Connected Components Workbench Improper Input Validation

2022-03-2319:46:36
CWE-22
icscert
www.cve.org
2
rockwell automation
connected components workbench
zip slip
vulnerability
input validation
privileges

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

29.0%

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

CNA Affected

[
  {
    "product": "Connected Components Workbench",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "lessThanOrEqual": "v12.00.00",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

29.0%

Related for CVELIST:CVE-2021-27473