CVE-2021-27464 – Rockwell Automation FactoryTalk AssetCentre SQL Injection
https://notcve.org/view.php?id=CVE-2021-27464
The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements. El servicio ArchiveService.rem de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores, expone funciones que carecen de la autenticación apropiada. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado ejecutar sentencias SQL arbitrarias • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-27460 – Rockwell Automation FactoryTalk AssetCentre Deserialization of Untrusted Data
https://notcve.org/view.php?id=CVE-2021-27460
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines. Los componentes de Rockwell Automation FactoryTalk AssetCentre versiones v10.00 y anteriores , contienen endpoints de remoting .NET que deserializan datos no confiables sin verificar suficientemente que los datos resultantes sean válidos. Esta vulnerabilidad puede permitir a un atacante remoto no autenticado obtener acceso completo al servidor principal de FactoryTalk AssetCentre y a todas las máquinas de los agentes • https://idp.rockwellautomation.com/adfs/ls/idpinitiatedsignon.aspx?RelayState=RPID%3Drockwellautomation.custhelp.com%26RelayState%3Danswers%2Fanswer_view%2Fa_id%2F1130831 https://www.cisa.gov/uscert/ics/advisories/icsa-21-091-01 • CWE-502: Deserialization of Untrusted Data •
CVE-2020-25180 – Rockwell Automation ISaGRAF5 Runtime Use of Hard-coded Cryptographic Key
https://notcve.org/view.php?id=CVE-2020-25180
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device. Rockwell Automation ISaGRAF Runtime versiones 4.x y 5.x, incluyen la funcionalidad setting a password que es requerida para ejecutar comandos privilegiados. El valor de la contraseña que es pasada a ISaGRAF Runtime es el resultado de la encriptación llevada a cabo con un valor de clave fijo usando el algoritmo de encriptación diminuto (TEA) en una contraseña introducida o guardada. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf • CWE-321: Use of Hard-coded Cryptographic Key CWE-798: Use of Hard-coded Credentials •
CVE-2020-25184 – Rockwell Automation ISaGRAF5 Runtime Unprotected Storage of Credentials
https://notcve.org/view.php?id=CVE-2020-25184
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure. Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x, almacena la contraseña en texto plano en un archivo que está en el mismo directorio que el archivo ejecutable. ISaGRAF Runtime lee el archivo y guarda los datos en una variable sin ninguna modificación adicional. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •
CVE-2020-25176 – Rockwell Automation ISaGRAF5 Runtime Relative Path Traversal
https://notcve.org/view.php?id=CVE-2020-25176
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution. Algunos comandos usados por el protocolo de Rockwell Automation ISaGRAF Runtime Versiones 4.x y 5.x eXchange Layer (IXL) llevan a cabo varias operaciones de archivo en el sistema de archivos. Dado que el parámetro que apunta al nombre del archivo no es comprobado en busca de caracteres reservados, es posible que un atacante remoto no autenticado recorra el directorio de una aplicación, lo que podría conllevar a una ejecución remota de código • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04 https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699 https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01 https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •