Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-25182 (GCVE-0-2020-25182)
Vulnerability from cvelistv5 – Published: 2022-03-18 18:00 – Updated: 2025-04-16 17:59- CWE-427 - Uncontrolled Search Path Element
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Rockwell Automation | ISaGRAF Runtime |
Affected:
4.x
Affected: 5.x |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:26:09.509Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-25182",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T17:30:58.796672Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:59:44.664Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "ISaGRAF Runtime",
"vendor": "Rockwell Automation",
"versions": [
{
"status": "affected",
"version": "4.x"
},
{
"status": "affected",
"version": "5.x"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Kaspersky reported these vulnerabilities to Rockwell Automation."
}
],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427 Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-18T18:00:30.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
],
"solutions": [
{
"lang": "en",
"value": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.\n\nRockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.\n\nTo reduce risk, Rockwell Automation recommends users:\n Employ proper network segmentation and security controls.\n Minimize network exposure for all control system devices.\n Locate control systems behind firewalls.\n Isolate control systems from other networks when possible.\n Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.\n Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.\n Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u2019s folder location is granted with a minimum amount of rights, as needed.\n\nPlease see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Rockwell Automation ISaGRAF5 Runtime Uncontrolled Search Path Element",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-25182",
"STATE": "PUBLIC",
"TITLE": "Rockwell Automation ISaGRAF5 Runtime Uncontrolled Search Path Element"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ISaGRAF Runtime",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.x"
},
{
"version_affected": "=",
"version_value": "5.x"
}
]
}
}
]
},
"vendor_name": "Rockwell Automation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Kaspersky reported these vulnerabilities to Rockwell Automation."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427 Uncontrolled Search Path Element"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01",
"refsource": "CONFIRM",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699",
"refsource": "CONFIRM",
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04",
"refsource": "CONFIRM",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"name": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf",
"refsource": "CONFIRM",
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
]
},
"solution": [
{
"lang": "en",
"value": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.\n\nRockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.\n\nTo reduce risk, Rockwell Automation recommends users:\n Employ proper network segmentation and security controls.\n Minimize network exposure for all control system devices.\n Locate control systems behind firewalls.\n Isolate control systems from other networks when possible.\n Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.\n Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.\n Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u2019s folder location is granted with a minimum amount of rights, as needed.\n\nPlease see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2020-25182",
"datePublished": "2022-03-18T18:00:30.000Z",
"dateReserved": "2020-09-04T00:00:00.000Z",
"dateUpdated": "2025-04-16T17:59:44.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.7.1\", \"matchCriteriaId\": \"E07AFED6-47CC-4A19-80DB-C537F4F07736\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45E6C3FA-001D-449A-A512-327FA0C9AC5A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.1.0\", \"matchCriteriaId\": \"01E1BC45-FFB3-4D5A-BA09-BA56A492E784\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2EF5114-E9EB-47E1-A388-0963337906C6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"d6.1\", \"matchCriteriaId\": \"17A5F6A2-32F6-4CDA-B2FE-EAA86B6BC43F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4F6A5C4-E0B2-44F2-823F-9E9C59E7B1F5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"716B1453-6203-4E7C-947D-71A031F79B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"05986825-76CD-486D-941A-E69A084F2A3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"F59F968F-E480-4262-9754-BBC180E1AE24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"514C1283-E965-4543-991B-24FD5AA07D58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"E3FDEC1C-930B-4B8D-A67A-1D46E2069A9B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2240540D-73BB-47F1-A8CA-844DC6B00CE6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.06.21\", \"matchCriteriaId\": \"AC5965EE-EB40-443A-BFDE-E97BD1C0F4E3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6D73382-1957-4CC7-953F-D57C005D63B0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*\", \"matchCriteriaId\": \"6011641C-4319-4FC3-9EB4-F8537A2C50C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*\", \"matchCriteriaId\": \"A08C5894-6894-44B7-809C-542732BDE84B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4034AC56-BEC6-49EA-9C42-6D0AE360B7E1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.06.12\", \"matchCriteriaId\": \"47A24A85-B912-4A15-AB2E-BF2EE739686F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E65C2AD5-0079-47AA-82F3-F9335DCFA0AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"10024\", \"matchCriteriaId\": \"6D556CAB-DA72-4978-BB45-5B2834C03061\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C543522-AD89-48DD-90BB-47D686E93ADF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53C778F7-64DA-4FD4-BB7F-2E5BB8BDB774\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.40\", \"matchCriteriaId\": \"81F6F3FE-B508-4482-B832-992242F80D30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*\", \"versionEndIncluding\": \"6.6.8\", \"matchCriteriaId\": \"6B1C6230-85E9-4053-90EB-715919960F80\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5798DD01-C49B-4DA9-9E83-2C875A345A1A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CBC81B7-2559-46EB-A129-0456442C06D9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9FCA425-ACD4-4F6F-97CF-3B05A1C003E8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7635A8EC-2D15-4BC6-938C-DC30AA21BEAB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFBB963-DD14-405D-B9ED-6277354A5A57\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EE48F31-B3FE-463F-B366-05116E4093DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EEDFAA2-4E38-457E-9E50-802984D1C0E6\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8BD0226-7434-4849-AD0D-35AB5A793F25\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAFD020B-28D9-4EC5-A282-4D42DC02A34C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09DEF107-D1C4-456A-BB02-1731498568FD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.2.0\", \"matchCriteriaId\": \"F64B0A94-A252-4052-A2C2-CD2374E3CCF2\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:windows:*:*\", \"versionStartIncluding\": \"5.0\", \"versionEndExcluding\": \"6.0\", \"matchCriteriaId\": \"15255D21-E663-4CDD-8320-9062902C6DA7\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\"}, {\"lang\": \"es\", \"value\": \"Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x, busca y carga DLLs como bibliotecas din\\u00e1micas. Una carga no controlada de bibliotecas din\\u00e1micas podr\\u00eda permitir a un atacante local no autenticado ejecutar c\\u00f3digo arbitrario. Esta vulnerabilidad s\\u00f3lo afecta a ISaGRAF Runtime cuando es ejecutado en sistemas Microsoft Windows\"}]",
"id": "CVE-2020-25182",
"lastModified": "2024-11-21T05:17:34.790",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-03-18T18:15:09.243",
"references": "[{\"url\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-427\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-427\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-25182\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2022-03-18T18:15:09.243\",\"lastModified\":\"2024-11-21T05:17:34.790\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\"},{\"lang\":\"es\",\"value\":\"Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x, busca y carga DLLs como bibliotecas din\u00e1micas. Una carga no controlada de bibliotecas din\u00e1micas podr\u00eda permitir a un atacante local no autenticado ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad s\u00f3lo afecta a ISaGRAF Runtime cuando es ejecutado en sistemas Microsoft Windows\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.1\",\"matchCriteriaId\":\"E07AFED6-47CC-4A19-80DB-C537F4F07736\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E6C3FA-001D-449A-A512-327FA0C9AC5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.0\",\"matchCriteriaId\":\"01E1BC45-FFB3-4D5A-BA09-BA56A492E784\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2EF5114-E9EB-47E1-A388-0963337906C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"d6.1\",\"matchCriteriaId\":\"17A5F6A2-32F6-4CDA-B2FE-EAA86B6BC43F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F6A5C4-E0B2-44F2-823F-9E9C59E7B1F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"716B1453-6203-4E7C-947D-71A031F79B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"05986825-76CD-486D-941A-E69A084F2A3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"F59F968F-E480-4262-9754-BBC180E1AE24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"514C1283-E965-4543-991B-24FD5AA07D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"E3FDEC1C-930B-4B8D-A67A-1D46E2069A9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2240540D-73BB-47F1-A8CA-844DC6B00CE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.06.21\",\"matchCriteriaId\":\"AC5965EE-EB40-443A-BFDE-E97BD1C0F4E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D73382-1957-4CC7-953F-D57C005D63B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"6011641C-4319-4FC3-9EB4-F8537A2C50C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"A08C5894-6894-44B7-809C-542732BDE84B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4034AC56-BEC6-49EA-9C42-6D0AE360B7E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.06.12\",\"matchCriteriaId\":\"47A24A85-B912-4A15-AB2E-BF2EE739686F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E65C2AD5-0079-47AA-82F3-F9335DCFA0AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10024\",\"matchCriteriaId\":\"6D556CAB-DA72-4978-BB45-5B2834C03061\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C543522-AD89-48DD-90BB-47D686E93ADF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53C778F7-64DA-4FD4-BB7F-2E5BB8BDB774\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.40\",\"matchCriteriaId\":\"81F6F3FE-B508-4482-B832-992242F80D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*\",\"versionEndIncluding\":\"6.6.8\",\"matchCriteriaId\":\"6B1C6230-85E9-4053-90EB-715919960F80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5798DD01-C49B-4DA9-9E83-2C875A345A1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CBC81B7-2559-46EB-A129-0456442C06D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9FCA425-ACD4-4F6F-97CF-3B05A1C003E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7635A8EC-2D15-4BC6-938C-DC30AA21BEAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFBB963-DD14-405D-B9ED-6277354A5A57\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE48F31-B3FE-463F-B366-05116E4093DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEDFAA2-4E38-457E-9E50-802984D1C0E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BD0226-7434-4849-AD0D-35AB5A793F25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAFD020B-28D9-4EC5-A282-4D42DC02A34C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DEF107-D1C4-456A-BB02-1731498568FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.0\",\"matchCriteriaId\":\"F64B0A94-A252-4052-A2C2-CD2374E3CCF2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"5.0\",\"versionEndExcluding\":\"6.0\",\"matchCriteriaId\":\"15255D21-E663-4CDD-8320-9062902C6DA7\"}]}]}],\"references\":[{\"url\":\"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T15:26:09.509Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-25182\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T17:30:58.796672Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T17:31:00.646Z\"}}], \"cna\": {\"title\": \"Rockwell Automation ISaGRAF5 Runtime Uncontrolled Search Path Element\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Kaspersky reported these vulnerabilities to Rockwell Automation.\"}], \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Rockwell Automation\", \"product\": \"ISaGRAF Runtime\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.x\"}, {\"status\": \"affected\", \"version\": \"5.x\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.\\n\\nRockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.\\n\\nTo reduce risk, Rockwell Automation recommends users:\\n Employ proper network segmentation and security controls.\\n Minimize network exposure for all control system devices.\\n Locate control systems behind firewalls.\\n Isolate control systems from other networks when possible.\\n Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.\\n Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.\\n Ensure the least-privilege user principle is followed, and user/service account access to Runtime\\u2019s folder location is granted with a minimum amount of rights, as needed.\\n\\nPlease see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.\"}], \"references\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-427\", \"description\": \"CWE-427 Uncontrolled Search Path Element\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2022-03-18T18:00:30.000Z\"}, \"x_legacyV4Record\": {\"credit\": [{\"lang\": \"eng\", \"value\": \"Kaspersky reported these vulnerabilities to Rockwell Automation.\"}], \"impact\": {\"cvss\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, \"source\": {\"discovery\": \"EXTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"4.x\", \"version_affected\": \"=\"}, {\"version_value\": \"5.x\", \"version_affected\": \"=\"}]}, \"product_name\": \"ISaGRAF Runtime\"}]}, \"vendor_name\": \"Rockwell Automation\"}]}}, \"solution\": [{\"lang\": \"en\", \"value\": \"Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.\\n\\nRockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.\\n\\nTo reduce risk, Rockwell Automation recommends users:\\n Employ proper network segmentation and security controls.\\n Minimize network exposure for all control system devices.\\n Locate control systems behind firewalls.\\n Isolate control systems from other networks when possible.\\n Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.\\n Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.\\n Ensure the least-privilege user principle is followed, and user/service account access to Runtime\\u2019s folder location is granted with a minimum amount of rights, as needed.\\n\\nPlease see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.\"}], \"data_type\": \"CVE\", \"generator\": {\"engine\": \"Vulnogram 0.0.9\"}, \"references\": {\"reference_data\": [{\"url\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"name\": \"https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"name\": \"https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"name\": \"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"name\": \"https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-427 Uncontrolled Search Path Element\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-25182\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Rockwell Automation ISaGRAF5 Runtime Uncontrolled Search Path Element\", \"ASSIGNER\": \"ics-cert@hq.dhs.gov\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-25182\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-16T17:59:44.664Z\", \"dateReserved\": \"2020-09-04T00:00:00.000Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2022-03-18T18:00:30.000Z\", \"assignerShortName\": \"icscert\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SEVD-2021-159-04
Vulnerability from csaf_se - Published: 2021-06-08 04:36 - Updated: 2025-11-15 00:00Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.
ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\nhttps://www.se.com/us/en/download/document/7EN52-0390/\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document. \n",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\nFor further information related to cybersecurity in Schneider Electric\u2019s products, visit the company\u2019s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment.\n\nWe provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries.\n\nWe are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values.\n\nwww.se.com ",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "On June 8, 2021, Rockwell Automation disclosed multiple vulnerabilities in its ISaGRAF Workbench and ISaGRAF Runtime products. Multiple vendors, including Schneider Electric, embed ISaGRAF in their offers.\nISaGRAF Workbench is used to program applications for embedded devices using IEC 61131-3 languages and may be incorporated into larger programming and configuration tools. The ISaGRAF Runtime module executes the process control code created in ISaGRAF Workbench on embedded devices.\nIf successfully exploited, bad actors could execute a range of actions, including accessing and disclosing sensitive information, privilege escalation, and in some cases remote code execution.\nCustomers should immediately ensure they have implemented cybersecurity best practices across their operations to protect themselves from possible exploitation of these vulnerabilities. Where appropriate, this includes locating their industrial systems and remotely accessible devices behind firewalls; installing physical controls to prevent unauthorized access; preventing mission-critical systems and devices from being accessed from outside networks; and following the mitigations and general security recommendations below.\nFor additional information and support, please contact your Schneider Electric sales or service representative or Schneider Electric\u2019s Customer Care Center.\nSubscribe to the Schneider Electric security notification service to be informed of critical\nupdates to this notification, including information on affected products and remediation plans:\nhttps://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp\nNovember 2022 Update: Talus T4e and T4c RTUs were added as affected products along with a mitigation.\nMarch 2023 Update: A remediation is available for SCD2200 product.",
"title": "Overview"
}
],
"publisher": {
"category": "vendor",
"contact_details": "cpcert@se.com",
"name": "Schneider Electric CPCERT",
"namespace": "https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp"
},
"references": [
{
"category": "self",
"summary": "ISaGRAF Vulnerabilities - SEVD-2021-159-04 PDF Version",
"url": "https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"
},
{
"category": "self",
"summary": "ISaGRAF Vulnerabilities - SEVD-2021-159-04 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2021-159-04.json"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
}
],
"title": "ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools",
"tracking": {
"current_release_date": "2025-11-15T00:00:00.000Z",
"generator": {
"date": "2025-11-14T06:13:58.534Z",
"engine": {
"name": "Schneider Electric CSAF Generator",
"version": "1.2"
}
},
"id": "SEVD-2021-159-04",
"initial_release_date": "2021-06-08T04:36:25.000Z",
"revision_history": [
{
"date": "2021-06-08T04:36:25.000Z",
"number": "1.0.0",
"summary": "Original Release"
},
{
"date": "2021-09-14T04:36:25.000Z",
"number": "2.0.0",
"summary": "Added remediations for SAGE RTU C3414 CPU, C3413 CPU and C3412 CPU"
},
{
"date": "2021-11-09T04:36:25.000Z",
"number": "3.0.0",
"summary": "Added remediations for SCADAPack 300E RTU, SCADAPack 53xE RTU, and SCADAPack Workbench"
},
{
"date": "2022-11-08T04:36:25.000Z",
"number": "4.0.0",
"summary": "Talus T4e and T4c RTUs were added as affected products along with a mitigation"
},
{
"date": "2023-03-14T06:30:00.000Z",
"number": "5.0.0",
"summary": "A remediation is available for SCD2200 product (page 3)."
},
{
"date": "2024-01-09T00:00:00.000Z",
"number": "6.0.0",
"summary": "New mitigations for the PowerLogic T300, MiCOM C264 D7.21 (or later) OR Easergy C5 1.1.6 (or later), PACiS GTW, and EPAS GTW are available for download."
},
{
"date": "2024-03-12T00:00:00.000Z",
"number": "7.0.0",
"summary": "New mitigations for Saitel DP and Saitel DR are available for download (page 5)."
},
{
"date": "2025-11-15T00:00:00.000Z",
"number": "8.0.0",
"summary": "Corrected Versions for Easergy C5 \u0026 MiCOM C264 and Added CVSS Details for Related CVEs."
}
],
"status": "final",
"version": "8.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2.8.2",
"product": {
"name": "Schneider Electric Easergy T300 \u003c2.8.2",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "Easergy T300"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.0.x",
"product": {
"name": "Schneider Electric Easergy C5 Versions up to 1.0.x",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "Easergy C5"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=D6.x",
"product": {
"name": "Schneider Electric MiCOM C264 Versions up to D6.x",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "MiCOM C264"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.2",
"product": {
"name": "Schneider Electric PACiS GTW \u003c5.2",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "PACiS GTW"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=11.06.21",
"product": {
"name": "Schneider Electric Saitel DP \u003c=11.06.21",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "Saitel DP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=11.06.12",
"product": {
"name": "Schneider Electric Saitel DR \u003c=11.06.12",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "Saitel DR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cA18",
"product": {
"name": "Schneider Electric Talus T4e RTU \u003cA18",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "Talus T4e RTU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cA19.08",
"product": {
"name": "Schneider Electric Talus T4c RTU \u003cA19.08",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "Talus T4c RTU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.18.1",
"product": {
"name": "Schneider Electric SCADAPack E \u003c8.18.1",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "SCADAPack E"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.6.8",
"product": {
"name": "Schneider Electric SCADAPack Workbench \u003c6.6.8",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "SCADAPack Workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cC3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU - C3414 CPU \u003cC3414-500-S02K5_P5",
"product_id": "11",
"product_identification_helper": {
"model_numbers": [
"C3414"
]
}
}
}
],
"category": "product_name",
"name": "SAGE RTU - C3414 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Schneider Electric SAGE RTU - C3413 CPU C3412 CPU All Firmware Versions",
"product_id": "12",
"product_identification_helper": {
"model_numbers": [
"C3413",
"C3412"
]
}
}
}
],
"category": "product_name",
"name": "SAGE RTU - C3413 CPU C3412 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=10024",
"product": {
"name": "Schneider Electric SCD2200 \u003c=10024",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "SCD2200"
},
{
"branches": [
{
"category": "product_version",
"name": "8.19.1",
"product": {
"name": "Schneider Electric SCADAPack E 8.19.1",
"product_id": "14",
"product_identification_helper": {
"model_numbers": [
"300E",
"53xE"
]
}
}
}
],
"category": "product_name",
"name": "SCADAPack E"
},
{
"branches": [
{
"category": "product_version",
"name": "8.19.1",
"product": {
"name": "Schneider Electric SCADAPack Workbench 8.19.1",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "SCADAPack Workbench"
},
{
"branches": [
{
"category": "product_version",
"name": "C3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU - C3413 CPU C3412 CPU C3414-500-S02K5_P5",
"product_id": "16",
"product_identification_helper": {
"model_numbers": [
"C3413",
"C3412"
]
}
}
}
],
"category": "product_name",
"name": "SAGE RTU - C3413 CPU C3412 CPU"
},
{
"branches": [
{
"category": "product_version",
"name": "C3414-500-S02K5_P5",
"product": {
"name": "Schneider Electric SAGE RTU - C3414 CPU C3414-500-S02K5_P5",
"product_id": "17",
"product_identification_helper": {
"model_numbers": [
"C3414"
]
}
}
}
],
"category": "product_name",
"name": "SAGE RTU - C3414 CPU"
},
{
"branches": [
{
"category": "product_version_range",
"name": "V9.1.0 or later (14942)",
"product": {
"name": "Schneider Electric SCD2200 \u003c10024",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "SCD2200"
}
],
"category": "vendor",
"name": "Schneider Electric"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=5.2",
"product": {
"name": "Rockwell Automation ISaGRAF Runtime Versions 5.2 and prior",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "ISaGRAF Runtime"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "Rockwell Automation ISaGRAF Runtime Versions 5.2 and prior default component of Schneider Electric Easergy C5 Versions up to 1.0.x",
"product_id": "20"
},
"product_reference": "19",
"relates_to_product_reference": "2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "Rockwell Automation ISaGRAF Runtime Versions 5.2 and prior default component of Schneider Electric MiCOM C264 Versions up to D6.x",
"product_id": "21"
},
"product_reference": "19",
"relates_to_product_reference": "3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25176",
"notes": [
{
"category": "description",
"text": "Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application\u2019s directory, which could lead to remote code execution.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"14",
"15",
"16",
"17",
"18"
],
"known_affected": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
},
"remediations": [
{
"category": "mitigation",
"details": "New mitigations for the PowerLogic T300 are available for download. These mitigations reduce, but do not eliminate the risk of this vulnerability. Firmware v2.9.0 (or later) for the T300 is available for download here: https://www.se.com/ww/en/download/document/T300_Firmware/ If you cannot update to v2.9.0 (or later) please note the following. Customers should use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.If ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/ww/en/download/document/T300_Firmware/"
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode. NOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request MiCOM C264 D7.21 (or later) OR Easergy C5 1.1.6 (or later).",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode. NOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request MiCOM C264 D7.21 (or later) OR Easergy C5 1.1.6 (or later).",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should use the OS firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.For detailed instructions, please contact your Schneider Electric representative and request \u201cGTW ISaGRAF vulnerabilities mitigation plan.\u201dNOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request EPAS Gateway v6.4.615.100.102 or later.",
"product_ids": [
"4"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "New mitigations for Saitel DP are available for download. These mitigations reduce, but do not eliminate the risk of this vulnerability. Firmware SM_CPU866e v11.06.32 (or later) for Saitel DP is available for download here: https://www.se.com/il/en/product-range/61747-saiteldp/#software-and-firmware If you cannot update to Firmware SM_CPU866e v11.06.32 (or later) please note the following. Customers should use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug. If ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/il/en/product-range/61747-saiteldp/#software-and-firmware"
},
{
"category": "mitigation",
"details": "New mitigations for Saitel DR are available for download. These mitigations reduce, but do not eliminate the risk of this vulnerability. Firmware HUe v11.06.27 (or later) for Saitel DR is available for download here: https://www.se.com/il/en/product-range/62685-saitel-dr-remoteterminal-unit-controller#software-and-firmware If you cannot update to Firmware HUe v11.06.27 (or later) please note the following. Customers should use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug. If ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"6"
],
"restart_required": {
"category": "none"
},
"url": "https://www.se.com/il/en/product-range/62685-saitel-dr-remoteterminal-unit-controller#software-and-firmware"
},
{
"category": "vendor_fix",
"details": "Customers should upgrade to the firmware V9.1.0 or later (14942), which incorporates ISaGRAF Workbench V6.6.9. Notification of firmware release can be found here: https://secommunities.force.com/PAkb/s/article/CCN000244525 A reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.",
"product_ids": [
"13"
],
"restart_required": {
"category": "system"
},
"url": "https://secommunities.force.com/PAkb/s/article/CCN000244525"
},
{
"category": "mitigation",
"details": "Implement firewall rules to restrict or block access on TCP port 1131 from outside the industrial control system.\r\nDisable the ISaGRAF/TCP service when not required. Typically, this service is needed only during commissioning or maintenance operations.\r\nLimit and control administrative access rights for ISaGRAF services.\r\nUpgrade to ISaGRAF 6.6.9 (A19.09 Firmware or later).",
"product_ids": [
"7",
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "V8.19.1 of SCADAPack Workbench includes a fix for these vulnerabilities and is available for download here:\r\nhttps://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities.\r\nA reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.\r\nTo verify the remediation is in place, use SCADAPack E Configurator or the RTU command line to display the firmware version.",
"product_ids": [
"9",
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities."
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "SAGE RTU CPU\u2019s C3413 and C3412 have reached their end of life and are no longer supported. Customers should immediately upgrade to the latest CPU C3414 and apply C3414-500-S02K5_P5 or later firmware which can be downloaded here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
}
],
"title": "CVE-2020-25176"
},
{
"cve": "CVE-2020-25178",
"notes": [
{
"category": "description",
"text": "ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.\r\n\r\n",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"14",
"15",
"16",
"17",
"18"
],
"known_affected": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
},
"remediations": [
{
"category": "mitigation",
"details": "New mitigations for the PowerLogic T300 are available for download. These mitigations reduce, but do not eliminate the risk of this vulnerability. Firmware v2.9.0 (or later) for the T300 is available for download here: https://www.se.com/ww/en/download/document/T300_Firmware/ If you cannot update to v2.9.0 (or later) please note the following. Customers should use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.If ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode. NOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request MiCOM C264 D7.21 (or later) OR Easergy C5 1.1.6 (or later).",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode. NOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request MiCOM C264 D7.21 (or later) OR Easergy C5 1.1.6 (or later).",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should use the OS firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.For detailed instructions, please contact your Schneider Electric representative and request \u201cGTW ISaGRAF vulnerabilities mitigation plan.\u201dNOTE: New mitigations are available for this product. These mitigations reduce, but do not eliminate the risk of this vulnerability. Please contact your authorized service provider / customer care and request EPAS Gateway v6.4.615.100.102 or later.",
"product_ids": [
"4"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DP firmware 11.06.00 or higher and use the product firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DR firmware 11.06.03 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"6"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Customers should upgrade to the firmware V9.1.0 or later (14942), which incorporates ISaGRAF Workbench V6.6.9. Notification of firmware release can be found here: https://secommunities.force.com/PAkb/s/article/CCN000244525 A reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.",
"product_ids": [
"13"
],
"restart_required": {
"category": "system"
},
"url": "https://secommunities.force.com/PAkb/s/article/CCN000244525"
},
{
"category": "mitigation",
"details": "Implement firewall rules to restrict or block access on TCP port 1131 from outside the industrial control system.\r\nDisable the ISaGRAF/TCP service when not required. Typically, this service is needed only during commissioning or maintenance operations.\r\nLimit and control administrative access rights for ISaGRAF services.\r\nUpgrade to ISaGRAF 6.6.9 (A19.09 Firmware or later).",
"product_ids": [
"7",
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "V8.19.1 of SCADAPack Workbench includes a fix for these vulnerabilities and is available for download here:\r\nhttps://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities.\r\nA reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.\r\nTo verify the remediation is in place, use SCADAPack E Configurator or the RTU command line to display the firmware version.",
"product_ids": [
"9",
"10"
],
"restart_required": {
"category": "system"
},
"url": "https://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities."
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "SAGE RTU CPU\u2019s C3413 and C3412 have reached their end of life and are no longer supported. Customers should immediately upgrade to the latest CPU C3414 and apply C3414-500-S02K5_P5 or later firmware which can be downloaded here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
}
],
"title": "CVE-2020-25178"
},
{
"cve": "CVE-2020-25182",
"notes": [
{
"category": "description",
"text": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\r\n\r\n",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"14",
"15",
"16",
"17",
"18"
],
"known_affected": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to T300 firmware V1.4 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode.",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "For detailed instructions, please contact your Schneider Electric representative and request \u201cC5 / C264 ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should use the OS firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nFor detailed instructions, please contact your Schneider Electric representative and request \u201cGTW ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"4"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DP firmware 11.06.00 or higher and use the product firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DR firmware 11.06.03 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"6"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Customers should upgrade to the firmware V9.1.0 or later (14942), which incorporates ISaGRAF Workbench V6.6.9. Notification of firmware release can be found here: https://secommunities.force.com/PAkb/s/article/CCN000244525 A reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.",
"product_ids": [
"13"
],
"restart_required": {
"category": "system"
},
"url": "https://secommunities.force.com/PAkb/s/article/CCN000244525"
},
{
"category": "mitigation",
"details": "Implement firewall rules to restrict or block access on TCP port 1131 from outside the industrial control system.\r\nDisable the ISaGRAF/TCP service when not required. Typically, this service is needed only during commissioning or maintenance operations.\r\nLimit and control administrative access rights for ISaGRAF services.\r\nUpgrade to ISaGRAF 6.6.9 (A19.09 Firmware or later).",
"product_ids": [
"7",
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "V8.19.1 of SCADAPack Workbench includes a fix for these vulnerabilities and is available for download here:\r\nhttps://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities.\r\nA reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.\r\nTo verify the remediation is in place, use SCADAPack E Configurator or the RTU command line to display the firmware version.",
"product_ids": [
"9",
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities."
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "SAGE RTU CPU\u2019s C3413 and C3412 have reached their end of life and are no longer supported. Customers should immediately upgrade to the latest CPU C3414 and apply C3414-500-S02K5_P5 or later firmware which can be downloaded here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
}
],
"title": "CVE-2020-25182"
},
{
"cve": "CVE-2020-25184",
"notes": [
{
"category": "description",
"text": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\r\n\r\n",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"14",
"15",
"16",
"17",
"18"
],
"known_affected": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to T300 firmware V1.4 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode.",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "For detailed instructions, please contact your Schneider Electric representative and request \u201cC5 / C264 ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should use the OS firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nFor detailed instructions, please contact your Schneider Electric representative and request \u201cGTW ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"4"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DP firmware 11.06.00 or higher and use the product firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DR firmware 11.06.03 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"6"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Customers should upgrade to the firmware V9.1.0 or later (14942), which incorporates ISaGRAF Workbench V6.6.9. Notification of firmware release can be found here: https://secommunities.force.com/PAkb/s/article/CCN000244525 A reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.",
"product_ids": [
"13"
],
"restart_required": {
"category": "system"
},
"url": "https://secommunities.force.com/PAkb/s/article/CCN000244525"
},
{
"category": "mitigation",
"details": "Implement firewall rules to restrict or block access on TCP port 1131 from outside the industrial control system.\r\nDisable the ISaGRAF/TCP service when not required. Typically, this service is needed only during commissioning or maintenance operations.\r\nLimit and control administrative access rights for ISaGRAF services.\r\nUpgrade to ISaGRAF 6.6.9 (A19.09 Firmware or later).",
"product_ids": [
"7",
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "V8.19.1 of SCADAPack Workbench includes a fix for these vulnerabilities and is available for download here:\r\nhttps://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities.\r\nA reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.\r\nTo verify the remediation is in place, use SCADAPack E Configurator or the RTU command line to display the firmware version.",
"product_ids": [
"9",
"10"
],
"restart_required": {
"category": "system"
},
"url": "https://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities."
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "SAGE RTU CPU\u2019s C3413 and C3412 have reached their end of life and are no longer supported. Customers should immediately upgrade to the latest CPU C3414 and apply C3414-500-S02K5_P5 or later firmware which can be downloaded here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
}
],
"title": "CVE-2020-25184"
},
{
"cve": "CVE-2020-25180",
"notes": [
{
"category": "description",
"text": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.\r\n\r\n",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"14",
"15",
"16",
"17",
"18"
],
"known_affected": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to T300 firmware V1.4 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"1"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "ISaGRAF program upload/debug mode is disabled by default, after enabling for product commissioning, disable ISaGRAF program upload/debug mode.",
"product_ids": [
"20"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "For detailed instructions, please contact your Schneider Electric representative and request \u201cC5 / C264 ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"21"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should use the OS firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nFor detailed instructions, please contact your Schneider Electric representative and request \u201cGTW ISaGRAF vulnerabilities mitigation plan.\u201d",
"product_ids": [
"4"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DP firmware 11.06.00 or higher and use the product firewall to block TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"5"
],
"restart_required": {
"category": "none"
}
},
{
"category": "mitigation",
"details": "If ISaGRAF is configured, customers should upgrade to Saitel DR firmware 11.06.03 or higher and use the product firewall to block the TCP port 1131 and only unblock it during new program upgrade/debug.\r\nIf ISaGRAF is not configured, the service is not active and the port is closed, then no further action is required.",
"product_ids": [
"6"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "Customers should upgrade to the firmware V9.1.0 or later (14942), which incorporates ISaGRAF Workbench V6.6.9. Notification of firmware release can be found here: https://secommunities.force.com/PAkb/s/article/CCN000244525 A reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.",
"product_ids": [
"13"
],
"restart_required": {
"category": "system"
},
"url": "https://secommunities.force.com/PAkb/s/article/CCN000244525"
},
{
"category": "mitigation",
"details": "Implement firewall rules to restrict or block access on TCP port 1131 from outside the industrial control system.\r\nDisable the ISaGRAF/TCP service when not required. Typically, this service is needed only during commissioning or maintenance operations.\r\nLimit and control administrative access rights for ISaGRAF services.\r\nUpgrade to ISaGRAF 6.6.9 (A19.09 Firmware or later).",
"product_ids": [
"7",
"8"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "V8.19.1 of SCADAPack Workbench includes a fix for these vulnerabilities and is available for download here:\r\nhttps://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities.\r\nA reboot is required when upgrading to new firmware. No user actions are required to apply the remediation beyond upgrading the firmware in the RTU.\r\nTo verify the remediation is in place, use SCADAPack E Configurator or the RTU command line to display the firmware version.",
"product_ids": [
"9",
"10"
],
"restart_required": {
"category": "none"
},
"url": "https://shop.exchange.se.com/en-US/apps/62865/scadapack-e-workbench-and-utilities."
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "none"
}
},
{
"category": "vendor_fix",
"details": "SAGE RTU CPU\u2019s C3413 and C3412 have reached their end of life and are no longer supported. Customers should immediately upgrade to the latest CPU C3414 and apply C3414-500-S02K5_P5 or later firmware which can be downloaded here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.",
"product_ids": [
"12"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
},
{
"category": "vendor_fix",
"details": "Version C3414-500-S02K5_P5 of SAGE RTU CPU 3414 includes a fix for this vulnerability and is available for download here:\r\nhttps://www.sage-rtu.com/downloads.html\r\nReboot of SAGE RTU is required after firmware upgrade.\r\nThis fix disables ISaGRAF by default and provides an additional network service checkbox to allow you to enable the ISaGRAF ETCP task, which will open listening ports to connect with ISaGRAF workbench when needed.\r\nOR\r\nIf the firmware is not upgraded to C3414-500-S02K5_P5, but you are at firmware version C3414-500-S02K2 or above customers should immediately apply the following mitigations to reduce the risk of exploit:\r\nIf ISaGRAF is configured and in use, the built-in firewall can be used to disable ISaGRAF port 1131 and 1113 when the debugger is not in use. Use the following commands in the Firewall configuration to disable external access to ISaGRAF.\r\nblock in proto tcp from any to any port = 1131\r\nblock in proto tcp from any to any port = 1113\r\nIf ISaGRAF is NOT configured and in use, the ISaGRAF port is by default not enabled and does not start automatically, therefore there is no issue or required actions.",
"product_ids": [
"11"
],
"restart_required": {
"category": "system"
},
"url": "https://www.sage-rtu.com/downloads.html"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"20",
"21"
]
}
],
"title": "CVE-2020-25180"
}
]
}
FKIE_CVE-2020-25182
Vulnerability from fkie_nvd - Published: 2022-03-18 18:15 - Updated: 2024-11-21 05:176.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E07AFED6-47CC-4A19-80DB-C537F4F07736",
"versionEndIncluding": "2.7.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45E6C3FA-001D-449A-A512-327FA0C9AC5A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01E1BC45-FFB3-4D5A-BA09-BA56A492E784",
"versionEndExcluding": "1.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2EF5114-E9EB-47E1-A388-0963337906C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17A5F6A2-32F6-4CDA-B2FE-EAA86B6BC43F",
"versionEndExcluding": "d6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4F6A5C4-E0B2-44F2-823F-9E9C59E7B1F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "716B1453-6203-4E7C-947D-71A031F79B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*",
"matchCriteriaId": "05986825-76CD-486D-941A-E69A084F2A3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*",
"matchCriteriaId": "F59F968F-E480-4262-9754-BBC180E1AE24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*",
"matchCriteriaId": "514C1283-E965-4543-991B-24FD5AA07D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*",
"matchCriteriaId": "E3FDEC1C-930B-4B8D-A67A-1D46E2069A9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2240540D-73BB-47F1-A8CA-844DC6B00CE6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC5965EE-EB40-443A-BFDE-E97BD1C0F4E3",
"versionEndIncluding": "11.06.21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D73382-1957-4CC7-953F-D57C005D63B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*",
"matchCriteriaId": "6011641C-4319-4FC3-9EB4-F8537A2C50C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*",
"matchCriteriaId": "A08C5894-6894-44B7-809C-542732BDE84B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4034AC56-BEC6-49EA-9C42-6D0AE360B7E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47A24A85-B912-4A15-AB2E-BF2EE739686F",
"versionEndIncluding": "11.06.12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E65C2AD5-0079-47AA-82F3-F9335DCFA0AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D556CAB-DA72-4978-BB45-5B2834C03061",
"versionEndIncluding": "10024",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C543522-AD89-48DD-90BB-47D686E93ADF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53C778F7-64DA-4FD4-BB7F-2E5BB8BDB774",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81F6F3FE-B508-4482-B832-992242F80D30",
"versionEndIncluding": "1.40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*",
"matchCriteriaId": "6B1C6230-85E9-4053-90EB-715919960F80",
"versionEndIncluding": "6.6.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5798DD01-C49B-4DA9-9E83-2C875A345A1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBC81B7-2559-46EB-A129-0456442C06D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FCA425-ACD4-4F6F-97CF-3B05A1C003E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7635A8EC-2D15-4BC6-938C-DC30AA21BEAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFBB963-DD14-405D-B9ED-6277354A5A57",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE48F31-B3FE-463F-B366-05116E4093DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EEDFAA2-4E38-457E-9E50-802984D1C0E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8BD0226-7434-4849-AD0D-35AB5A793F25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFD020B-28D9-4EC5-A282-4D42DC02A34C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09DEF107-D1C4-456A-BB02-1731498568FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F64B0A94-A252-4052-A2C2-CD2374E3CCF2",
"versionEndExcluding": "3.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:windows:*:*",
"matchCriteriaId": "15255D21-E663-4CDD-8320-9062902C6DA7",
"versionEndExcluding": "6.0",
"versionStartIncluding": "5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems."
},
{
"lang": "es",
"value": "Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x, busca y carga DLLs como bibliotecas din\u00e1micas. Una carga no controlada de bibliotecas din\u00e1micas podr\u00eda permitir a un atacante local no autenticado ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad s\u00f3lo afecta a ISaGRAF Runtime cuando es ejecutado en sistemas Microsoft Windows"
}
],
"id": "CVE-2020-25182",
"lastModified": "2024-11-21T05:17:34.790",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-18T18:15:09.243",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2020-25182
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-25182",
"description": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.",
"id": "GSD-2020-25182"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-25182"
],
"details": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.",
"id": "GSD-2020-25182",
"modified": "2023-12-13T01:21:57.017487Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-25182",
"STATE": "PUBLIC",
"TITLE": "Rockwell Automation ISaGRAF5 Runtime Uncontrolled Search Path Element"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ISaGRAF Runtime",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "4.x"
},
{
"version_affected": "=",
"version_value": "5.x"
}
]
}
}
]
},
"vendor_name": "Rockwell Automation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Kaspersky reported these vulnerabilities to Rockwell Automation."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-427 Uncontrolled Search Path Element"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01",
"refsource": "CONFIRM",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699",
"refsource": "CONFIRM",
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04",
"refsource": "CONFIRM",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"name": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf",
"refsource": "CONFIRM",
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
]
},
"solution": [
{
"lang": "eng",
"value": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.\n\nRockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.\n\nTo reduce risk, Rockwell Automation recommends users:\n Employ proper network segmentation and security controls.\n Minimize network exposure for all control system devices.\n Locate control systems behind firewalls.\n Isolate control systems from other networks when possible.\n Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.\n Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.\n Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u2019s folder location is granted with a minimum amount of rights, as needed.\n\nPlease see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products."
}
],
"source": {
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "d6.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.06.21",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.06.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10024",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.40",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6.8",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0",
"versionStartIncluding": "5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2020-25182"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"name": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699",
"refsource": "CONFIRM",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"name": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-04-05T13:36Z",
"publishedDate": "2022-03-18T18:15Z"
}
}
}
CERTFR-2024-AVI-0013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Easergy Studio versions antérieures à v9.3.5 | ||
| Schneider Electric | N/A | Magelis XBT | ||
| Schneider Electric | N/A | Modicon M580 versions antérieures à sv4.20 | ||
| Schneider Electric | N/A | EcoStruxure Control Expert versions antérieures à v16.0 | ||
| Schneider Electric | N/A | Harmony/Magelis HMISCU versions antérieures à 6.3.1 | ||
| Schneider Electric | N/A | contrôleurs PacDrive sans le dernier correctif de sécurité | ||
| Schneider Electric | N/A | PowerLogic T300, MiCOM C264 D7.21 (et ultérieures) ou Easergy C5 1.1.6 (et ultérieures), PACiS GTW et EPAS GTW sans les dernières mesures de contournement | ||
| Schneider Electric | N/A | contrôleurs Modicon M241, M251 et M262, HMISCU et EcoStruxure Machine Expert sans les derniers correctifs de sécurité et mesures de contournement |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Easergy Studio versions ant\u00e9rieures \u00e0 v9.3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Magelis XBT",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M580 versions ant\u00e9rieures \u00e0 sv4.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EcoStruxure Control Expert versions ant\u00e9rieures \u00e0 v16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Harmony/Magelis HMISCU versions ant\u00e9rieures \u00e0 6.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "contr\u00f4leurs PacDrive sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic T300, MiCOM C264 D7.21 (et ult\u00e9rieures) ou Easergy C5 1.1.6 (et ult\u00e9rieures), PACiS GTW et EPAS GTW sans les derni\u00e8res mesures de contournement",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "contr\u00f4leurs Modicon M241, M251 et M262, HMISCU et EcoStruxure Machine Expert sans les derniers correctifs de s\u00e9curit\u00e9 et mesures de contournement",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-4046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4046"
},
{
"name": "CVE-2023-7032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7032"
},
{
"name": "CVE-2023-27976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27976"
},
{
"name": "CVE-2023-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1548"
},
{
"name": "CVE-2020-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25176"
},
{
"name": "CVE-2020-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25178"
},
{
"name": "CVE-2023-28355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28355"
},
{
"name": "CVE-2022-4224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4224"
},
{
"name": "CVE-2020-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25180"
},
{
"name": "CVE-2019-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6833"
},
{
"name": "CVE-2020-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25184"
},
{
"name": "CVE-2020-25182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25182"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-01 du 13 ao\u00fbt 2019",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-225-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2019-225-01.json"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2024-009-02 du 09 janvier 2024",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-009-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-009-02.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-03 du 11 avril 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-101-03.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-010-06 du 10 janvier 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-010-06_Modicon_Controllers_Security_Notification.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-01 du 11 avril 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-101-01.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-04 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-04.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 10 janvier 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"
}
]
}
CERTFR-2021-AVI-443
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Modicon X80 BMXNOR0200H RTU versions antérieures à SV1.70 IR22 | ||
| Schneider Electric | N/A | module Definition de IGSS (Interactive Graphical SCADA System) versions antérieures à 15.0.0.21141 | ||
| Schneider Electric | N/A | PowerLogic PM5560 et PM5563 versions antérieures à V2.7.8 | ||
| Schneider Electric | N/A | PowerLogic PM5561 et PM5562 versions antérieures à V2.5.4 | ||
| Schneider Electric | N/A | PowerLogic EGX100 et EGX300 (produits en fin de vie, aucun correctif n'est prévu) | ||
| Schneider Electric | N/A | PowerLogic PM8ECC toutes versions (produit en fin de vie, aucun correctif n'est prévu) | ||
| Schneider Electric | N/A | Enerlin’X Com’X versions antérieures à V6.8.4 | ||
| Schneider Electric | N/A | les produits Schneider Electric utilisant RockWell ISaGRAF (se référer au bulletin de sécurité SEVD-2021-159-04 de l'éditeur, cf. section Documentation) |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Modicon X80 BMXNOR0200H RTU versions ant\u00e9rieures \u00e0 SV1.70 IR22",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "module Definition de IGSS (Interactive Graphical SCADA System) versions ant\u00e9rieures \u00e0 15.0.0.21141",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM5560 et PM5563 versions ant\u00e9rieures \u00e0 V2.7.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM5561 et PM5562 versions ant\u00e9rieures \u00e0 V2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic EGX100 et EGX300 (produits en fin de vie, aucun correctif n\u0027est pr\u00e9vu)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM8ECC toutes versions (produit en fin de vie, aucun correctif n\u0027est pr\u00e9vu)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Enerlin\u2019X Com\u2019X versions ant\u00e9rieures \u00e0 V6.8.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "les produits Schneider Electric utilisant RockWell ISaGRAF (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 SEVD-2021-159-04 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22753"
},
{
"name": "CVE-2021-22750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22750"
},
{
"name": "CVE-2021-22763",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22763"
},
{
"name": "CVE-2021-22767",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22767"
},
{
"name": "CVE-2021-22754",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22754"
},
{
"name": "CVE-2021-22756",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22756"
},
{
"name": "CVE-2021-22765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22765"
},
{
"name": "CVE-2021-22755",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22755"
},
{
"name": "CVE-2020-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25176"
},
{
"name": "CVE-2021-22764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22764"
},
{
"name": "CVE-2020-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25178"
},
{
"name": "CVE-2021-22768",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22768"
},
{
"name": "CVE-2021-22749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22749"
},
{
"name": "CVE-2021-22752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22752"
},
{
"name": "CVE-2021-22760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22760"
},
{
"name": "CVE-2020-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25180"
},
{
"name": "CVE-2021-22766",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22766"
},
{
"name": "CVE-2021-22761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22761"
},
{
"name": "CVE-2021-22758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22758"
},
{
"name": "CVE-2021-22769",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22769"
},
{
"name": "CVE-2020-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25184"
},
{
"name": "CVE-2021-22759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22759"
},
{
"name": "CVE-2021-22751",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22751"
},
{
"name": "CVE-2021-22757",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22757"
},
{
"name": "CVE-2021-22762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22762"
},
{
"name": "CVE-2020-25182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25182"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-443",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans\u00a0les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-03 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-05 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-01 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-02 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-06 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-06"
}
]
}
CERTFR-2021-AVI-443
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Modicon X80 BMXNOR0200H RTU versions antérieures à SV1.70 IR22 | ||
| Schneider Electric | N/A | module Definition de IGSS (Interactive Graphical SCADA System) versions antérieures à 15.0.0.21141 | ||
| Schneider Electric | N/A | PowerLogic PM5560 et PM5563 versions antérieures à V2.7.8 | ||
| Schneider Electric | N/A | PowerLogic PM5561 et PM5562 versions antérieures à V2.5.4 | ||
| Schneider Electric | N/A | PowerLogic EGX100 et EGX300 (produits en fin de vie, aucun correctif n'est prévu) | ||
| Schneider Electric | N/A | PowerLogic PM8ECC toutes versions (produit en fin de vie, aucun correctif n'est prévu) | ||
| Schneider Electric | N/A | Enerlin’X Com’X versions antérieures à V6.8.4 | ||
| Schneider Electric | N/A | les produits Schneider Electric utilisant RockWell ISaGRAF (se référer au bulletin de sécurité SEVD-2021-159-04 de l'éditeur, cf. section Documentation) |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Modicon X80 BMXNOR0200H RTU versions ant\u00e9rieures \u00e0 SV1.70 IR22",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "module Definition de IGSS (Interactive Graphical SCADA System) versions ant\u00e9rieures \u00e0 15.0.0.21141",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM5560 et PM5563 versions ant\u00e9rieures \u00e0 V2.7.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM5561 et PM5562 versions ant\u00e9rieures \u00e0 V2.5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic EGX100 et EGX300 (produits en fin de vie, aucun correctif n\u0027est pr\u00e9vu)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic PM8ECC toutes versions (produit en fin de vie, aucun correctif n\u0027est pr\u00e9vu)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Enerlin\u2019X Com\u2019X versions ant\u00e9rieures \u00e0 V6.8.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "les produits Schneider Electric utilisant RockWell ISaGRAF (se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 SEVD-2021-159-04 de l\u0027\u00e9diteur, cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22753"
},
{
"name": "CVE-2021-22750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22750"
},
{
"name": "CVE-2021-22763",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22763"
},
{
"name": "CVE-2021-22767",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22767"
},
{
"name": "CVE-2021-22754",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22754"
},
{
"name": "CVE-2021-22756",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22756"
},
{
"name": "CVE-2021-22765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22765"
},
{
"name": "CVE-2021-22755",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22755"
},
{
"name": "CVE-2020-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25176"
},
{
"name": "CVE-2021-22764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22764"
},
{
"name": "CVE-2020-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25178"
},
{
"name": "CVE-2021-22768",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22768"
},
{
"name": "CVE-2021-22749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22749"
},
{
"name": "CVE-2021-22752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22752"
},
{
"name": "CVE-2021-22760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22760"
},
{
"name": "CVE-2020-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25180"
},
{
"name": "CVE-2021-22766",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22766"
},
{
"name": "CVE-2021-22761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22761"
},
{
"name": "CVE-2021-22758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22758"
},
{
"name": "CVE-2021-22769",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22769"
},
{
"name": "CVE-2020-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25184"
},
{
"name": "CVE-2021-22759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22759"
},
{
"name": "CVE-2021-22751",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22751"
},
{
"name": "CVE-2021-22757",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22757"
},
{
"name": "CVE-2021-22762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22762"
},
{
"name": "CVE-2020-25182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25182"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-443",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans\u00a0les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-03 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-05 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-01 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-02 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-06 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-06"
}
]
}
CERTFR-2024-AVI-0013
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Schneider Electric | N/A | Easergy Studio versions antérieures à v9.3.5 | ||
| Schneider Electric | N/A | Magelis XBT | ||
| Schneider Electric | N/A | Modicon M580 versions antérieures à sv4.20 | ||
| Schneider Electric | N/A | EcoStruxure Control Expert versions antérieures à v16.0 | ||
| Schneider Electric | N/A | Harmony/Magelis HMISCU versions antérieures à 6.3.1 | ||
| Schneider Electric | N/A | contrôleurs PacDrive sans le dernier correctif de sécurité | ||
| Schneider Electric | N/A | PowerLogic T300, MiCOM C264 D7.21 (et ultérieures) ou Easergy C5 1.1.6 (et ultérieures), PACiS GTW et EPAS GTW sans les dernières mesures de contournement | ||
| Schneider Electric | N/A | contrôleurs Modicon M241, M251 et M262, HMISCU et EcoStruxure Machine Expert sans les derniers correctifs de sécurité et mesures de contournement |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Easergy Studio versions ant\u00e9rieures \u00e0 v9.3.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Magelis XBT",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Modicon M580 versions ant\u00e9rieures \u00e0 sv4.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "EcoStruxure Control Expert versions ant\u00e9rieures \u00e0 v16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "Harmony/Magelis HMISCU versions ant\u00e9rieures \u00e0 6.3.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "contr\u00f4leurs PacDrive sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "PowerLogic T300, MiCOM C264 D7.21 (et ult\u00e9rieures) ou Easergy C5 1.1.6 (et ult\u00e9rieures), PACiS GTW et EPAS GTW sans les derni\u00e8res mesures de contournement",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
},
{
"description": "contr\u00f4leurs Modicon M241, M251 et M262, HMISCU et EcoStruxure Machine Expert sans les derniers correctifs de s\u00e9curit\u00e9 et mesures de contournement",
"product": {
"name": "N/A",
"vendor": {
"name": "Schneider Electric",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-4046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4046"
},
{
"name": "CVE-2023-7032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7032"
},
{
"name": "CVE-2023-27976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27976"
},
{
"name": "CVE-2023-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1548"
},
{
"name": "CVE-2020-25176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25176"
},
{
"name": "CVE-2020-25178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25178"
},
{
"name": "CVE-2023-28355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28355"
},
{
"name": "CVE-2022-4224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4224"
},
{
"name": "CVE-2020-25180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25180"
},
{
"name": "CVE-2019-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6833"
},
{
"name": "CVE-2020-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25184"
},
{
"name": "CVE-2020-25182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25182"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0013",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2019-225-01 du 13 ao\u00fbt 2019",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2019-225-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2019-225-01.json"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2024-009-02 du 09 janvier 2024",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-009-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2024-009-02.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-03 du 11 avril 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-101-03.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-010-06 du 10 janvier 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-010-06\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-010-06_Modicon_Controllers_Security_Notification.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-101-01 du 11 avril 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-101-01.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-04 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-04.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 10 janvier 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2021-159-04 du 08 juin 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2021-159-04_ISaGRAF_Security_Notification.pdf"
}
]
}
ICSA-20-280-01
Vulnerability from csaf_cisa - Published: 2020-10-06 00:00 - Updated: 2021-06-17 00:00{
"document": {
"acknowledgments": [
{
"organization": "Kaspersky",
"summary": "reporting these vulnerabilities to Rockwell Automation"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities may result in remote code execution, information disclosure, or a denial-of-service condition.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy, Water and Wastewater Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-20-280-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2020/icsa-20-280-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-20-280-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-20-280-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/ncas/tips/ST04-014"
}
],
"title": "Rockwell Automation ISaGRAF5 Runtime (Update A)",
"tracking": {
"current_release_date": "2021-06-17T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-20-280-01",
"initial_release_date": "2020-10-06T00:00:00.000000Z",
"revision_history": [
{
"date": "2020-10-06T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-20-280-01P Rockwell Automation ISaGRAF5 Runtime"
},
{
"date": "2021-06-08T00:00:00.000000Z",
"legacy_version": "A",
"number": "2",
"summary": "ICSA-20-280-01 Rockwell Automation ISaGRAF5 Runtime (Update A)"
},
{
"date": "2021-06-17T00:00:00.000000Z",
"legacy_version": "B",
"number": "3",
"summary": "ICSA-20-280-01 Rockwell Automation ISaGRAF5 Runtime (Update B)"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "Micro800 family: all versions",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Micro800 family"
},
{
"branches": [
{
"category": "product_version",
"name": "vers:all/*",
"product": {
"name": "GE reports that GE Steam Power\u0027s ALSPA S6 MFC3000 and MFC1000: (all versions) a distributed control system are impacted by vulnerabilities in Rockwell\u0027s ISaGRAF runtime",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "GE Steam Power\u0027s ALSPA S6 MFC3000 and MFC1000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 1.40",
"product": {
"name": "AADvance Controller: version 1.40 and earlier",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "AADvance Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c= 6.6.8",
"product": {
"name": "ISaGRAF Free Runtime in ISaGRAF6 Workbench: Version 6.6.8 and earlier",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "ISaGRAF Free Runtime in ISaGRAF6 Workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 3.2.0",
"product": {
"name": "Xylem reports that MultiSmart Gen-1 devices and MultiSmart Gen-2 devices running firmware: prior to Version 3.2.0 contain a version of ISaGRAF 5.x. If ISaGRAF is enabled on those devices then they might be affected by these vulnerabilities",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "MultiSmart Gen-1 devices and MultiSmart Gen-2"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-25176",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "summary",
"text": "Some commands used by the ISaGRAF eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application \u0027s directory, which could lead to remote code execution.CVE-2020-25176 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25176"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026refSoft=1\u0026toggleState=\u0026versions=60131"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Reference Rockwell Automation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Employ proper network segmentation and security controls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Locate control systems behind firewalls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Isolate control systems from other networks when possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf"
},
{
"category": "mitigation",
"details": "Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights, as needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2020-25184",
"cwe": {
"id": "CWE-256",
"name": "Plaintext Storage of a Password"
},
"notes": [
{
"category": "summary",
"text": "ISaGRAF Runtime stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure.CVE-2020-25184 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25184"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026refSoft=1\u0026toggleState=\u0026versions=60131"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Reference Rockwell Automation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Employ proper network segmentation and security controls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Locate control systems behind firewalls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Isolate control systems from other networks when possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf"
},
{
"category": "mitigation",
"details": "Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights, as needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2020-25178",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "summary",
"text": "ISaGRAF Workbench communicates with ISaGRAF Runtime using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.CVE-2020-25178 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25178"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026refSoft=1\u0026toggleState=\u0026versions=60131"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Reference Rockwell Automation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Employ proper network segmentation and security controls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Locate control systems behind firewalls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Isolate control systems from other networks when possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf"
},
{
"category": "mitigation",
"details": "Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights, as needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2020-25182",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "summary",
"text": "ISaGRAF Runtime searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.CVE-2020-25182 has been assigned to this vulnerability. A CVSS v3 base score of 6.7 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25182"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026refSoft=1\u0026toggleState=\u0026versions=60131"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Reference Rockwell Automation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Employ proper network segmentation and security controls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Locate control systems behind firewalls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Isolate control systems from other networks when possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf"
},
{
"category": "mitigation",
"details": "Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights, as needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2020-25180",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "summary",
"text": "ISaGRAF Runtime includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the Tiny Encryption Algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.CVE-2020-25180 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25180"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users update to ISaGRAF Runtime 5 Version 5.72.00. End users are encouraged to restrict or block access on TCP 1131 and TCP 1132 from outside the industrial control system. Confirm the least-privilege user principle is followed and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://compatibility.rockwellautomation.com/Pages/MultiProductFindDownloads.aspx?crumb=112\u0026refSoft=1\u0026toggleState=\u0026versions=60131"
},
{
"category": "mitigation",
"details": "Rockwell Automation recommends users of affected versions evaluate the mitigations provided and apply the appropriate mitigations to deployed products. Users are encouraged to combine this guidance with the general security guidelines for a comprehensive defense-in-depth strategy.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Reference Rockwell Automation.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Employ proper network segmentation and security controls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Minimize network exposure for all control system devices.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Locate control systems behind firewalls.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Isolate control systems from other networks when possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://literature.rockwellautomation.com/idc/groups/literature/documents/td/enet-td001_-en-p.pdf"
},
{
"category": "mitigation",
"details": "Consider using proper network infrastructure controls, such as firewalls, UTM devices, VPN, or other security appliances.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Ensure the least-privilege user principle is followed, and user/service account access to Runtime\u0027s folder location is granted with a minimum amount of rights, as needed.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Please see publications from Rockwell Automation and Schneider Electric, Xylem, or contact GE for further information about how to mitigate these vulnerabilities in additional affected products.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
}
]
}
GHSA-F6JG-3F64-GHP3
Vulnerability from github – Published: 2022-03-19 00:01 – Updated: 2022-04-06 00:02Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.
{
"affected": [],
"aliases": [
"CVE-2020-25182"
],
"database_specific": {
"cwe_ids": [
"CWE-427"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-03-18T18:15:00Z",
"severity": "MODERATE"
},
"details": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.",
"id": "GHSA-f6jg-3f64-ghp3",
"modified": "2022-04-06T00:02:18Z",
"published": "2022-03-19T00:01:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25182"
},
{
"type": "WEB",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04"
},
{
"type": "WEB",
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"type": "WEB",
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
VAR-202106-1938
Vulnerability from variot - Updated: 2023-12-18 10:58Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems. Rockwell Automation Provided by the company ISaGRAF5 Runtime The following multiple vulnerabilities exist in. * Relative path traversal (CWE-23) - CVE-2020-25176 ‥ * Plaintext storage of credentials (CWE-256) - CVE-2020-25184 ‥ * Sending important information in clear text (CWE-319) - CVE-2020-25178 ‥ * DLL File search path is not properly controlled (CWE-427) - CVE-2020-25182 ‥ * Use of hard-coded encryption key (CWE-321) - CVE-2020-25180The expected impact depends on each vulnerability, but it may be affected as follows. * Arbitrary code executed by a remote third party - CVE-2020-25176 ‥ * Passwords and information stolen by local users - CVE-2020-25184 ‥ * Files are uploaded, read and deleted by a remote third party - CVE-2020-25178 ‥ * ISaGRAF Runtime But Microsoft Windows Any code executed by a local third party when running on - CVE-2020-25182 ‥ * Information stolen by a remote third party - CVE-2020-25180. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202106-1938",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "isagraf free runtime",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "6.6.8"
},
{
"model": "aadvance controller",
"scope": "lte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "1.40"
},
{
"model": "micro820",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "scd2200",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "10024"
},
{
"model": "isagraf runtime",
"scope": "lt",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "6.0"
},
{
"model": "micro850",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "pacis gtw",
"scope": "eq",
"trust": 1.0,
"vendor": "schneider electric",
"version": "5.2"
},
{
"model": "easergy t300",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "2.7.1"
},
{
"model": "micro830",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "isagraf runtime",
"scope": "gte",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": "5.0"
},
{
"model": "easergy c5",
"scope": "lt",
"trust": 1.0,
"vendor": "schneider electric",
"version": "1.1.0"
},
{
"model": "pacis gtw",
"scope": "eq",
"trust": 1.0,
"vendor": "schneider electric",
"version": "6.1"
},
{
"model": "micro810",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "saitel dr",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "11.06.12"
},
{
"model": "pacis gtw",
"scope": "eq",
"trust": 1.0,
"vendor": "schneider electric",
"version": "6.3"
},
{
"model": "micro870",
"scope": "eq",
"trust": 1.0,
"vendor": "rockwellautomation",
"version": null
},
{
"model": "pacis gtw",
"scope": "eq",
"trust": 1.0,
"vendor": "schneider electric",
"version": "5.1"
},
{
"model": "saitel dp",
"scope": "lte",
"trust": 1.0,
"vendor": "schneider electric",
"version": "11.06.21"
},
{
"model": "epas gtw",
"scope": "eq",
"trust": 1.0,
"vendor": "schneider electric",
"version": "6.4"
},
{
"model": "multismart",
"scope": "lt",
"trust": 1.0,
"vendor": "xylem",
"version": "3.2.0"
},
{
"model": "micom c264",
"scope": "lt",
"trust": 1.0,
"vendor": "schneider electric",
"version": "d6.1"
},
{
"model": "multismart gen-1",
"scope": null,
"trust": 0.8,
"vendor": "xylem",
"version": null
},
{
"model": "alspa s6 mfc3000",
"scope": null,
"trust": 0.8,
"vendor": "ge steam power",
"version": null
},
{
"model": "aadvance controller",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "micro800",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "alspa s6 mfc1000",
"scope": null,
"trust": 0.8,
"vendor": "ge steam power",
"version": null
},
{
"model": "multismart gen-2",
"scope": null,
"trust": 0.8,
"vendor": "xylem",
"version": null
},
{
"model": "isagraf free runtime",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "isagraf runtime",
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.7.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:easergy_c5_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:easergy_c5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:micom_c264_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "d6.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:micom_c264:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:5.2:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.1:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:pacis_gtw_firmware:6.3:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:pacis_gtw:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:saitel_dp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.06.21",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:saitel_dp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:linux:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:epas_gtw_firmware:6.4:*:*:*:*:windows:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:epas_gtw:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:saitel_dr_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.06.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:saitel_dr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:schneider-electric:scd2200_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10024",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:cp-3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:schneider-electric:mc-31:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:aadvance_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.40",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:isagraf_free_runtime:*:*:*:*:*:isagraf6_workbench:*:*",
"cpe_name": [],
"versionEndIncluding": "6.6.8",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro810_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro810:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro820_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro820:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro830_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro850_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:rockwellautomation:micro870_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:rockwellautomation:micro870:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:xylem:multismart_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rockwellautomation:isagraf_runtime:*:*:*:*:*:windows:*:*",
"cpe_name": [],
"versionEndExcluding": "6.0",
"versionStartIncluding": "5.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-25182"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Kaspersky reported these vulnerabilities to Rockwell Automation.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
],
"trust": 0.6
},
"cve": "CVE-2020-25182",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-179135",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-001882",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-25182",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "ics-cert@hq.dhs.gov",
"id": "CVE-2020-25182",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2021-001882",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202106-523",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-179135",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179135"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems. Rockwell Automation Provided by the company ISaGRAF5 Runtime The following multiple vulnerabilities exist in. * Relative path traversal (CWE-23) - CVE-2020-25176 \u2025 * Plaintext storage of credentials (CWE-256) - CVE-2020-25184 \u2025 * Sending important information in clear text (CWE-319) - CVE-2020-25178 \u2025 * DLL File search path is not properly controlled (CWE-427) - CVE-2020-25182 \u2025 * Use of hard-coded encryption key (CWE-321) - CVE-2020-25180The expected impact depends on each vulnerability, but it may be affected as follows. * Arbitrary code executed by a remote third party - CVE-2020-25176 \u2025 * Passwords and information stolen by local users - CVE-2020-25184 \u2025 * Files are uploaded, read and deleted by a remote third party - CVE-2020-25178 \u2025 * ISaGRAF Runtime But Microsoft Windows Any code executed by a local third party when running on - CVE-2020-25182 \u2025 * Information stolen by a remote third party - CVE-2020-25180. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "VULHUB",
"id": "VHN-179135"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-25182",
"trust": 2.5
},
{
"db": "ICS CERT",
"id": "ICSA-20-280-01",
"trust": 2.5
},
{
"db": "SCHNEIDER",
"id": "SEVD-2021-159-04",
"trust": 1.7
},
{
"db": "JVN",
"id": "JVNVU90811375",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882",
"trust": 0.8
},
{
"db": "CS-HELP",
"id": "SB2021041363",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.2163",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021060920",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-179135",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179135"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"id": "VAR-202106-1938",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-179135"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T10:58:32.123000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Xylem\u00a0Product\u00a0Security\u00a0Advisory",
"trust": 0.8,
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"title": "Rockwell Automation ISaGRAF Fixes for code issue vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=154648"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-427",
"trust": 1.1
},
{
"problemtype": "Relative path traversal (CWE-23) [IPA Evaluation ]",
"trust": 0.8
},
{
"problemtype": " Plaintext storage of credentials (CWE-256) [IPA Evaluation ]",
"trust": 0.8
},
{
"problemtype": " Sending important information in clear text (CWE-319) [IPA Evaluation ]",
"trust": 0.8
},
{
"problemtype": " Use of hard-coded encryption key (CWE-321) [IPA Evaluation ]",
"trust": 0.8
},
{
"problemtype": " Uncontrolled search path elements (CWE-427) [IPA Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179135"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://download.schneider-electric.com/files?p_doc_ref=sevd-2021-159-04"
},
{
"trust": 1.7,
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699"
},
{
"trust": 1.7,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01"
},
{
"trust": 1.7,
"url": "https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf"
},
{
"trust": 1.4,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu90811375"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021041363"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.2163"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021060920"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2020-25182/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-179135"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-179135"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-03-18T00:00:00",
"db": "VULHUB",
"id": "VHN-179135"
},
{
"date": "2021-06-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"date": "2022-03-18T18:15:09.243000",
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"date": "2021-04-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"date": "2021-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-04-05T00:00:00",
"db": "VULHUB",
"id": "VHN-179135"
},
{
"date": "2021-06-21T08:28:00",
"db": "JVNDB",
"id": "JVNDB-2021-001882"
},
{
"date": "2022-04-05T13:36:23.510000",
"db": "NVD",
"id": "CVE-2020-25182"
},
{
"date": "2021-04-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202104-975"
},
{
"date": "2022-04-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202106-523"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Rockwell\u00a0Automation\u00a0 Made \u00a0ISaGRAF5\u00a0Runtime\u00a0 Multiple vulnerabilities in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-001882"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202104-975"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.