Lucene search

K
nvd[email protected]NVD:CVE-2023-2071
HistorySep 12, 2023 - 2:15 p.m.

CVE-2023-2071

2023-09-1214:15:09
CWE-20
CWE-434
web.nvd.nist.gov
5
rockwell automation
factorytalk view
remote code execution
unauthenticated
cip class
security bypass

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.001

Percentile

41.2%

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

Affected configurations

Nvd
Node
rockwellautomationpanelview_plusMatch-
AND
rockwellautomationfactorytalk_viewRange13.0machine
VendorProductVersionCPE
rockwellautomationpanelview_plus-cpe:2.3:h:rockwellautomation:panelview_plus:-:*:*:*:*:*:*:*
rockwellautomationfactorytalk_view*cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:machine:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.9

Confidence

High

EPSS

0.001

Percentile

41.2%

Related for NVD:CVE-2023-2071