Rockwell Automation ISaGRAF5 Runtime Use of Hard-coded Cryptographic Key
CVE-2020-25180

5.3MEDIUM

Key Information:

Vendor
CVE Published:
18 March 2022

Summary

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Affected Version(s)

ISaGRAF Runtime 4.x

ISaGRAF Runtime 5.x

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kaspersky reported these vulnerabilities to Rockwell Automation.
.