{ "id": "CVE-2022-2464", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2022-08-25T18:15:10.143", "lastModified": "2024-11-21T07:01:02.567", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful." }, { "lang": "es", "value": "Rockwell Automation ISaGRAF Workbench software versiones 6.0 hasta 6.6.9, est\u00e1n afectadas por una vulnerabilidad de Salto de Ruta. Los archivos maliciosos dise\u00f1ados pueden permitir a un atacante atravesar el sistema de archivos cuando son abiertos por ISaGRAF Workbench. Si es explotado con \u00e9xito, un atacante podr\u00eda sobrescribir los archivos existentes y crear archivos adicionales con los mismos permisos del software ISaGRAF Workbench. Es requerida una interacci\u00f3n del usuario para que la explotaci\u00f3n tenga \u00e9xito." } ], "metrics": { "cvssMetricV31": [ { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "baseScore": 7.7, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.0, "impactScore": 6.0 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "ics-cert@hq.dhs.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:rockwellautomation:isagraf_workbench:*:*:*:*:*:*:*:*", "versionStartIncluding": "6.0", "versionEndIncluding": "6.6.9", "matchCriteriaId": "54E95041-485F-48A3-A3C3-AA59F74EF64E" } ] } ] } ], "references": [ { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03", "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Patch", "Third Party Advisory", "US Government Resource" ] }, { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-03", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Third Party Advisory", "US Government Resource" ] } ] }