Lucene search

K
cvelistRockwellCVELIST:CVE-2023-2071
HistorySep 12, 2023 - 1:12 p.m.

CVE-2023-2071 FactoryTalk View Machine Edition Vulnerable to Remote Code Execution

2023-09-1213:12:42
CWE-20
Rockwell
www.cve.org
cve-2023-2071
remote code execution
rockwell automation

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Fa",
    "vendor": "Rockwell Automation",
    "versions": [
      {
        "status": "affected",
        "version": "<=13.0"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

Related for CVELIST:CVE-2023-2071