131 lines
4.8 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-12003",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2020-06-15T20:15:11.397",
"lastModified": "2020-06-24T15:28:24.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench: Version 12 and prior, ControlFLASH: Version 14 and later, ControlFLASH Plus: Version 1 and later, FactoryTalk Asset Centre: Version 9 and later, FactoryTalk Linx CommDTM: Version 1 and later, Studio 5000 Launcher: Version 31 and later Stud, 5000 Logix Designer software: Version 32 and prior is vulnerable. An exposed API call allows users to provide files to be processed without sanitation. This may allow an attacker to use specially crafted requests to traverse the file system and expose sensitive data on the local hard drive."
},
{
"lang": "es",
"value": "FactoryTalk Linx versiones 6.00, 6.10 y 6.11, RSLinx Classic versiones v4.11.00 y anteriores, Connected Components Workbench: versi\u00f3n 12 y anteriores, ControlFLASH: versi\u00f3n 14 y posteriores, ControlFLASH Plus: versi\u00f3n 1 y posteriores, FactoryTalk Asset Center: versi\u00f3n 9 y posteriores , FactoryTalk Linx CommDTM: versi\u00f3n 1 y posteriores, Studio 5000 Launcher: versi\u00f3n 31 y posteriores a Stud, software 5000 Logix Designer: versi\u00f3n 32 y anteriores son vulnerables. Una llamada expuesta de la API permite a los usuarios proporcionar archivos a ser procesados sin saneamiento. Esto puede permitir a un atacante usar peticiones especialmente dise\u00f1adas para saltar el sistema de archivos y exponer datos confidenciales en el disco duro local"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:6.00:*:*:*:*:*:*:*",
"matchCriteriaId": "244B67F2-DEC2-44E2-94F1-F6A82249453C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "767F223A-C4CE-49DE-B66F-51345E91C98F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_linx:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5675EA61-1854-4AA1-BA1B-E07442E1F10C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:rslinx_classic:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.11.00",
"matchCriteriaId": "4F6780E2-AB8D-4860-812F-CBE82A94EF0D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.us-cert.gov/ics/advisories/icsa-20-163-02",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}