Page 11 of 265 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre. Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, no restringen apropiadamente todas las funciones relacionadas con los servicios de remoting de IIS. Esta vulnerabilidad puede permitir que un atacante remoto no autenticado modifiqu... • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-676: Use of Potentially Dangerous Function •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements. El servicio AosService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores expone funciones que carecen de la autenticación apropiada. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado ejecutar sentencias SQL arbitraria... • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, which may allow for the execution of remote unauthenticated arbitrary SQL statements. Se presenta una vulnerabilidad en la función RunSearch del servicio SearchService de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, que puede permitir una ejecución de sentencias SQL arbitrarias remotas no autenticadas • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre. Se presenta una vulnerabilidad de deserialización en la forma en que el servicio AosService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, verifica los datos serializados. Esta vulnerabilida... • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-502: Deserialization of Untrusted Data •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements. El servicio ArchiveService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, expone funciones que carecen de la autenticación apropiada. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado ejecutar sentencias SQL a... • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

23 Mar 2022 — Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines. Los componentes de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores , contienen endpoints de remoting .NET que deserializan dato... • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 • CWE-502: Deserialization of Untrusted Data •

CVSS: 6.5EPSS: 0%CPEs: 36EXPL: 0

18 Mar 2022 — Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device. Rockwell Automati... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 36EXPL: 0

18 Mar 2022 — Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure. Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x, almacena la contraseña en texto plano en un archivo que está en el mismo directorio que el a... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •

CVSS: 9.8EPSS: 2%CPEs: 36EXPL: 0

18 Mar 2022 — Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution. Algunos comandos usados por el protocolo de Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x eXchange Layer (IXL) lle... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 9.3EPSS: 0%CPEs: 36EXPL: 0

18 Mar 2022 — ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files. ISaGRAF Workbench es comunicado con Rockwell Automation ISaGRAF Runtime versiones 4.x y 5.x, usando TCP/IP. Este protocolo de comunicación proporciona vari... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 • CWE-319: Cleartext Transmission of Sensitive Information •