Lucene search

K
nvd[email protected]NVD:CVE-2020-25182
HistoryMar 18, 2022 - 6:15 p.m.

CVE-2020-25182

2022-03-1818:15:09
CWE-427
web.nvd.nist.gov

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

15.7%

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

Affected configurations

NVD
Node
schneider-electriceasergy_t300_firmwareRange2.7.1
AND
schneider-electriceasergy_t300Match-
Node
schneider-electriceasergy_c5_firmwareRange<1.1.0
AND
schneider-electriceasergy_c5Match-
Node
schneider-electricmicom_c264_firmwareRange<d6.1
AND
schneider-electricmicom_c264Match-
Node
schneider-electricpacis_gtw_firmwareMatch5.1windows
OR
schneider-electricpacis_gtw_firmwareMatch5.2windows
OR
schneider-electricpacis_gtw_firmwareMatch6.1windows
OR
schneider-electricpacis_gtw_firmwareMatch6.3linux
OR
schneider-electricpacis_gtw_firmwareMatch6.3windows
AND
schneider-electricpacis_gtwMatch-
Node
schneider-electricsaitel_dp_firmwareRange11.06.21
AND
schneider-electricsaitel_dpMatch-
Node
schneider-electricepas_gtw_firmwareMatch6.4linux
OR
schneider-electricepas_gtw_firmwareMatch6.4windows
AND
schneider-electricepas_gtwMatch-
Node
schneider-electricsaitel_dr_firmwareRange11.06.12
AND
schneider-electricsaitel_drMatch-
Node
schneider-electricscd2200_firmwareRange10024
AND
schneider-electriccp-3Match-
OR
schneider-electricmc-31Match-
Node
rockwellautomationaadvance_controllerRange1.40
OR
rockwellautomationisagraf_free_runtimeRange6.6.8isagraf6_workbench
Node
rockwellautomationmicro810_firmwareMatch-
AND
rockwellautomationmicro810Match-
Node
rockwellautomationmicro820_firmwareMatch-
AND
rockwellautomationmicro820Match-
Node
rockwellautomationmicro830_firmwareMatch-
AND
rockwellautomationmicro830Match-
Node
rockwellautomationmicro850_firmwareMatch-
AND
rockwellautomationmicro850Match-
Node
rockwellautomationmicro870_firmwareMatch-
AND
rockwellautomationmicro870Match-
Node
xylemmultismart_firmwareRange<3.2.0
Node
rockwellautomationisagraf_runtimeRange5.06.0windows

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

15.7%

Related for NVD:CVE-2020-25182