Lucene search

K
RockwellautomationConnected Components Workbench

4 matches found

cve
cve
added 2022/03/23 8:15 p.m.87 views

CVE-2021-27475

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code executi...

8.6CVSS8.7AI score0.00205EPSS
cve
cve
added 2022/03/23 8:15 p.m.82 views

CVE-2021-27471

The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully ...

8.6CVSS8AI score0.00051EPSS
cve
cve
added 2022/04/01 11:15 p.m.74 views

CVE-2022-1018

When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confi...

5.5CVSS5.4AI score0.08363EPSS
cve
cve
added 2022/03/23 8:15 p.m.70 views

CVE-2021-27473

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive f...

8.2CVSS7.1AI score0.00003EPSS