6 results (0.009 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

When opening a malicious solution file provided by an attacker, the application suffers from an XML external entity vulnerability due to an unsafe call within a dynamic link library file. An attacker could exploit this to pass data from local files to a remote web server, leading to a loss of confidentiality. Cuando es abierto un archivo de solución malicioso proporcionado por un atacante, la aplicación sufre una vulnerabilidad de tipo XML external entity debido a una llamada no segura dentro de un archivo de biblioteca de enlace dinámico. Un atacante podría aprovechar esto para pasar datos de archivos locales a un servidor web remoto, conllevando a una pérdida de confidencialidad • https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-01 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited. Rockwell Automation Connected Components Workbench versiones v12.00.00 y anteriores, no limita los objetos que pueden ser deserializados. Esta vulnerabilidad permite a atacantes diseñar un objeto serializado malicioso que, si es abierto por un usuario local en Connected Components Workbench, puede resultar en una ejecución de código remota. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435 https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01 • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful. El mecanismo de análisis sintáctico que procesa determinados tipos de archivos no proporciona saneo de entrada para las rutas de archivos. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435 https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful. • https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131435 https://www.cisa.gov/uscert/ics/advisories/icsa-21-133-01 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.0EPSS: 0%CPEs: 9EXPL: 0

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges. Se detectó un problema de secuestro de DLL en Connected Components Workbench (CCW) de Rockwell Automation. • http://www.securityfocus.com/bid/97000 https://ics-cert.us-cert.gov/advisories/ICSA-17-047-01 • CWE-427: Uncontrolled Search Path Element •