Rockwell Automation ISaGRAF5 Runtime Relative Path Traversal
CVE-2020-25176

9.1CRITICAL

Key Information:

Vendor
CVE Published:
18 March 2022

Summary

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Affected Version(s)

ISaGRAF Runtime 4.x

ISaGRAF Runtime 5.x

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kaspersky reported these vulnerabilities to Rockwell Automation.
.